Perhaps off topic, but given the current world-wide scramble to patch windows 
systems to reduce the spread of "WannaCry", I wanted to take a minute to 
publicly thank the author and decision makers around adding the "SMBv1 
Unspecified Remote Code Execution (Shadow Brokers)" .nasl to the openvas scan 
feed way back in February.

They had the foresight to the seriousness of what was, the at that time, an 
unknown/unpatched vulnerability, and created a .nasl that was a cvss score of 
10 for simply having SMBv1 enabled. At least for myself, when I saw them 
occurring in my network, thought that was over-aggressive. After MS delivered a 
patch in March, the .nasl didn't clear obviously, and my opinion was 
re-enforced, believing now it was simply noisy. I was clearly wrong. I have no 
visibility into any of the decision making behind the scenes at greenbone, but 
clearly you guys are doing it right!

Thanks again, from myself, and on behalf of all openvas users around the world!

This e-mail may contain information that is privileged or confidential. If you 
are not the intended recipient, please delete the e-mail and any attachments 
and notify us immediately.
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to