On Wed, Oct 26, 2016 at 03:10:04PM +0200, Christian Fischer wrote: > Not directly. As long as one of the following binaries are found in the > PATH of the user for authenticated scans: > > php > php-cli > php5 > php7.0 > > the detection of PHP should work and you should get a "Linux PHP > Detection" (OID: 1.3.6.1.4.1.25623.1.0.103592) Log entry with the > detected PHP version. Based on this Vulnerabilities are reported for the > detected PHP independently from the distro package names.
How can I debug this detection? I've checked login into with ssh credentials manually and scan user has: $ whereis php php: /usr/bin/php /etc/php.ini /etc/php.d /usr/lib64/php /usr/include/php /usr/share/php /usr/share/man/man1/php.1.gz But I don't have any issue with PHP in my report :( _______________________________________________ Openvas-plugins mailing list Openvas-plugins@wald.intevation.org https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins