Perhaps off topic, but given the current world-wide scramble to patch windows systems to reduce the spread of "WannaCry", I wanted to take a minute to publicly thank the author and decision makers around adding the "SMBv1 Unspecified Remote Code Execution (Shadow Brokers)" .nasl to the openvas scan feed way back in February.
They had the foresight to the seriousness of what was, the at that time, an unknown/unpatched vulnerability, and created a .nasl that was a cvss score of 10 for simply having SMBv1 enabled. At least for myself, when I saw them occurring in my network, thought that was over-aggressive. After MS delivered a patch in March, the .nasl didn't clear obviously, and my opinion was re-enforced, believing now it was simply noisy. I was clearly wrong. I have no visibility into any of the decision making behind the scenes at greenbone, but clearly you guys are doing it right! Thanks again, from myself, and on behalf of all openvas users around the world! This e-mail may contain information that is privileged or confidential. If you are not the intended recipient, please delete the e-mail and any attachments and notify us immediately. _______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
