Indeed. Job well done Greenbone and OpenVAS community. Fabio
Em 15/05/2017 17:14, "Matt Koivisto" <[email protected]> escreveu: > Perhaps off topic, but given the current world-wide scramble to patch > windows systems to reduce the spread of "WannaCry", I wanted to take a > minute to publicly thank the author and decision makers around adding the > "SMBv1 Unspecified Remote Code Execution (Shadow Brokers)" .nasl to the > openvas scan feed way back in February. > > They had the foresight to the seriousness of what was, the at that time, > an unknown/unpatched vulnerability, and created a .nasl that was a cvss > score of 10 for simply having SMBv1 enabled. At least for myself, when I > saw them occurring in my network, thought that was over-aggressive. After > MS delivered a patch in March, the .nasl didn't clear obviously, and my > opinion was re-enforced, believing now it was simply noisy. I was clearly > wrong. I have no visibility into any of the decision making behind the > scenes at greenbone, but clearly you guys are doing it right! > > Thanks again, from myself, and on behalf of all openvas users around the > world! > > This e-mail may contain information that is privileged or confidential. If > you are not the intended recipient, please delete the e-mail and any > attachments and notify us immediately. > _______________________________________________ > Openvas-discuss mailing list > [email protected] > https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss >
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
