Dears,

we are facing a huge amount of false-positives in our reports after a scan of 
our Windows Server 2012 R2 systems. Some of them are on OS level and some on 
application level.

For Example:
NVT: Mozilla Firefox Security Bypass Vulnerability(mfsa_2017-27)-Windows
OID:

1.3.6.1.4.1.25623.1.0.805536

Version:

$Revision: 7699 $


NVT: Oracle Java SE Privilege Escalation Vulnerability (Windows)
OID:

1.3.6.1.4.1.25623.1.0.807248

Version:

$Revision: 7724 $


NVT: Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows
OID:

1.3.6.1.4.1.25623.1.0.811349

Version:

$Revision: 7790 $


NVT: Microsoft .NET Framework Remote Code Execution Vulnerability (KB4014983)
OID:

1.3.6.1.4.1.25623.1.0.810866

Version:

$Revision: 6106 $


NVT: Microsoft Internet Explorer Multiple Vulnerabilities (KB4056568)
OID:

1.3.6.1.4.1.25623.1.0.812289

Version:

$Revision: 8294 $


NVT: Microsoft Windows Multiple Vulnerabilities (KB4056898)
OID:

1.3.6.1.4.1.25623.1.0.812386

Version:

$Revision: 8294 $









All results are from the same Win 2k12 R2 Server. On the Server are all Updates 
installed and on Application Site (Java/Firefox/etc) are the newest versions 
installed as well.

Could someone help us to figure out, why those results are found?

Best Regards

Chris Anders
IT-Consultant

EXCON Information Management GmbH

Mob:   0049 1575 2451008
Web:  www.exconim.com<http://www.exconim.com/>     | E-Mail: 
c...@exconim.de<mailto:c...@exconim.de>

Neue Rothofstra├če 13-19, 60313 Frankfurt am Main

Sitz der Gesellschaft: Martin-Behaim-Stra├če 12, 63263 Neu-Isenburg
Amtsgericht Offenbach am Main HRB 49594, Ust. ID DE309148850



_______________________________________________
Openvas-plugins mailing list
Openvas-plugins@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to