Indeed. Job well done Greenbone and OpenVAS community.

Fabio

Em 15/05/2017 17:14, "Matt Koivisto" <[email protected]>
escreveu:

> Perhaps off topic, but given the current world-wide scramble to patch
> windows systems to reduce the spread of "WannaCry", I wanted to take a
> minute to publicly thank the author and decision makers around adding the
> "SMBv1 Unspecified Remote Code Execution (Shadow Brokers)" .nasl to the
> openvas scan feed way back in February.
>
> They had the foresight to the seriousness of what was, the at that time,
> an unknown/unpatched vulnerability, and created a .nasl that was a cvss
> score of 10 for simply having SMBv1 enabled. At least for myself, when I
> saw them occurring in my network, thought that was over-aggressive. After
> MS delivered a patch in March, the .nasl didn't clear obviously, and my
> opinion was re-enforced, believing now it was simply noisy. I was clearly
> wrong. I have no visibility into any of the decision making behind the
> scenes at greenbone, but clearly you guys are doing it right!
>
> Thanks again, from myself, and on behalf of all openvas users around the
> world!
>
> This e-mail may contain information that is privileged or confidential. If
> you are not the intended recipient, please delete the e-mail and any
> attachments and notify us immediately.
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to