Hello,

thanks for the hint.

But I can't find the file in my NVT directory. The NVT sync says: feed is 
current.
And the newest NVTs are dated March, 6th.

What's going wrong?

Best regards

Christian Ebert
Chief Security Analyst, CISM, T.I.S.P.
Head of Penetration Testing

QSC AG
Mathias-Brüggen-Straße 55
50829 Köln

T          +49 221 669-8950
F          +49 221 669-85950
M          +49 163 6698950
[email protected]<mailto:[email protected]>
http://www.qsc.de

Besuchen Sie unsere Blogs:
Corporate Blog unter http://blog.qsc.de<http://blog.qsc.de/>
Themen-Blog zur Digitalisierung unter 
http://digitales-wirtschaftswunder.de<http://digitales-wirtschaftswunder.de/>

Bitte finden Sie hier die handelsrechtlichen Pflichtangaben:
http://www.qsc.de/pflichtangaben

Von: Antu Sanadi [mailto:[email protected]]
Gesendet: Freitag, 17. März 2017 13:05
An: Ebert, Christian <[email protected]>; 
[email protected]
Betreff: Re: [Openvas-discuss] CVE-2017-5638


Hi,

Already NVT (gb_apache_struts_CVE_2017_5638.nasl)  is available is OpenVAS feed.
It should detect the mentioned CVE vulnerability .

Thanks
Antu Sanadi
On Wednesday 15 March 2017 09:49 PM, Ebert, Christian wrote:
Hi everyone,

is there any possibility to use OpenVAS to check against the Apache Struts2 
vulnerability CVE-2017-5638?

There is an NMAP NSE:  
https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html

Does anybody have experience with this NSE? Is it reliable?

Best regards

Christian Ebert




_______________________________________________

Openvas-discuss mailing list

[email protected]<mailto:[email protected]>

https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to