Hello,
thanks for the hint.
But I can't find the file in my NVT directory. The NVT sync says: feed is
current.
And the newest NVTs are dated March, 6th.
What's going wrong?
Best regards
Christian Ebert
Chief Security Analyst, CISM, T.I.S.P.
Head of Penetration Testing
QSC AG
Mathias-Brüggen-Straße 55
50829 Köln
T +49 221 669-8950
F +49 221 669-85950
M +49 163 6698950
christian.eb...@qsc.de<mailto:christian.eb...@qsc.de>
http://www.qsc.de
Besuchen Sie unsere Blogs:
Corporate Blog unter http://blog.qsc.de<http://blog.qsc.de/>
Themen-Blog zur Digitalisierung unter
http://digitales-wirtschaftswunder.de<http://digitales-wirtschaftswunder.de/>
Bitte finden Sie hier die handelsrechtlichen Pflichtangaben:
http://www.qsc.de/pflichtangaben
Von: Antu Sanadi [mailto:sa...@secpod.com]
Gesendet: Freitag, 17. März 2017 13:05
An: Ebert, Christian <christian.eb...@qsc.de>;
openvas-discuss@wald.intevation.org
Betreff: Re: [Openvas-discuss] CVE-2017-5638
Hi,
Already NVT (gb_apache_struts_CVE_2017_5638.nasl) is available is OpenVAS feed.
It should detect the mentioned CVE vulnerability .
Thanks
Antu Sanadi
On Wednesday 15 March 2017 09:49 PM, Ebert, Christian wrote:
Hi everyone,
is there any possibility to use OpenVAS to check against the Apache Struts2
vulnerability CVE-2017-5638?
There is an NMAP NSE:
https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html
Does anybody have experience with this NSE? Is it reliable?
Best regards
Christian Ebert
___
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org<mailto:Openvas-discuss@wald.intevation.org>
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
___
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss