From owner-freebsd-pkg@freebsd.org Fri Sep 25 10:54:48 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5612C3F27E3 for ; Fri, 25 Sep 2020 10:54:48 +0000 (UTC) (envelope-from yigithanbilge@sabanciuniv.edu) Received: from mail-wr1-x433.google.com (mail-wr1-x433.google.com [IPv6:2a00:1450:4864:20::433]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4ByTMC2Jlzz3VTr for ; Fri, 25 Sep 2020 10:54:46 +0000 (UTC) (envelope-from yigithanbilge@sabanciuniv.edu) Received: by mail-wr1-x433.google.com with SMTP id z1so3112755wrt.3 for ; Fri, 25 Sep 2020 03:54:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sabanciuniv-edu.20150623.gappssmtp.com; s=20150623; h=content-transfer-encoding:mime-version:subject:from:in-reply-to:cc :date:message-id:references:to; bh=q6TWUloMXp9EZ1hmw6ThSN48Y9CWAZU1xENzVf4qS7w=; b=vq43UJ7WJuMiezldD5vijaOuKpIv6HzMxFv+D0tuh3am8nHi1bTFpmH79WlijM8w5O TPcJlKADse+SV1lK0IkHoicBXk5nKFvhIuPzTEhVj3XzDLzb/DmtdBzGhOOUX6IVa2Ia rU0UE06NTYYpskXa/uKmGKRePNs4pY7Oq+E1eotqP/9bl2qLKZojqa0GR290ws8hJ4cN cZmwKsHL8B/jyoLwdzGmUAo+5sl4ZCff74RKPILrCC97nXyjHXGNZjs1Ja5CXhHS0jS6 jYwCaR3+pZTUGgzjgsPlFYkYzQ07piPCOPz6wcuxkriaXztF6dEO5Wo1buBDWUa+BwoV xfyg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:mime-version:subject :from:in-reply-to:cc:date:message-id:references:to; bh=q6TWUloMXp9EZ1hmw6ThSN48Y9CWAZU1xENzVf4qS7w=; b=n5LLzjQNPk81wLk9hcD7U30Ua8NoLNxzSnl/RLjSvimGQyqn/4OpVm+9uTgf2yAqBo XVofbkEGSNztJ+9fvnrvpDxSTz07P+DrG3eKkaFsAJ3J26xv7mFgb4SXdZQVH7kctdNc kKrmxGE81+l0mpnqnXdaNUDSUssf3J2M7e1RZf9OXxHwVJYWpJWf5EZ+iPeq+9Tbjw2n djFX9gR09XgzpeHxceg14Kp2lpz8S2peZcjvG6Yeyn/KMWLkV8X8x+E2UfsJBioxzLFV lKtpkQpbx5IPkoQydkYglqr3ruOwgrvYs50DgqmpjKvFy0sPAeC6PgEX3GBSD9r671KW sPtg== X-Gm-Message-State: AOAM531II5vRXVCsLFmQE87kjVQXicrcRhr4Ug6sVy5ecKO8SlFfrkCv xqf9PZ14z1QTs7ueYf5X/aQKiIx7h0PDWA== X-Google-Smtp-Source: ABdhPJwSv4aPWBDZrB7h1yga9pHKVWUf8NZflxPq7k2mBVbII3P208fXc7rQuXQtc1HgUwYHWiJddQ== X-Received: by 2002:adf:f290:: with SMTP id k16mr4111075wro.124.1601031282769; Fri, 25 Sep 2020 03:54:42 -0700 (PDT) Received: from [10.142.86.7] ([5.24.32.118]) by smtp.gmail.com with ESMTPSA id y1sm2387893wma.36.2020.09.25.03.54.41 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 25 Sep 2020 03:54:42 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (1.0) Subject: Re: FreeBSD OpenVAS Configuration From: "Yigithan Bilge (Student)" In-Reply-To: <20200924164146.GA64154@spindle.one-eyed-alien.net> Cc: freebsd-pkg@freebsd.org Date: Fri, 25 Sep 2020 13:54:40 +0300 Message-Id: References: <20200924164146.GA64154@spindle.one-eyed-alien.net> To: Brooks Davis X-Mailer: iPhone Mail (17H35) X-Rspamd-Queue-Id: 4ByTMC2Jlzz3VTr X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=sabanciuniv-edu.20150623.gappssmtp.com header.s=20150623 header.b=vq43UJ7W; dmarc=none; spf=pass (mx1.freebsd.org: domain of yigithanbilge@sabanciuniv.edu designates 2a00:1450:4864:20::433 as permitted sender) smtp.mailfrom=yigithanbilge@sabanciuniv.edu X-Spamd-Result: default: False [-2.45 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[sabanciuniv-edu.20150623.gappssmtp.com:s=20150623]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-pkg@freebsd.org]; DMARC_NA(0.00)[sabanciuniv.edu]; NEURAL_HAM_LONG(-1.02)[-1.025]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[sabanciuniv-edu.20150623.gappssmtp.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::433:from]; NEURAL_HAM_SHORT(-0.43)[-0.426]; NEURAL_HAM_MEDIUM(-1.00)[-0.995]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-pkg]; RECEIVED_SPAMHAUS_PBL(0.00)[5.24.32.118:received] X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Sep 2020 10:54:48 -0000 Thank you, but in the site you shared there are new packages named gvm-libs a= nd old packages named openvas. I can=E2=80=99t find and download new package= s, there is no reply for =E2=80=9Cpkg search gvm-libs=E2=80=9D command in th= e freebsd. How can I get these new updated packages? Do you have any idea? Thanks, ygthn > Brooks Davis =C5=9Funlar=C4=B1 yazd=C4=B1 (24 Eyl 202= 0 19:41): >=20 > =EF=BB=BFIt appears that OpenVAS is complaining about itself in a confusin= g and > unhelpful way. According to the following page, GVM is new branding for > OpenVAS. >=20 > https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management >=20 > -- Brooks >=20 >>> On Thu, Sep 24, 2020 at 01:42:41PM +0300, Yigithan Bilge (Student) wrote= : >> Hey, >> I currently work on a project to scan a network and find vulnerabilities >> which has to be on FreeBSD. So, as a first step, I installed packages of >> openvas9 and scanned the network by using the web interface. There is als= o >> a server on ubuntu to see what openvas will find. >> On the report, there is a vulnerability called ???Report outdated / >> end-of-life Scan Engine / Environment (local)??? which makes me think the= >> system isn???t working quite well since the server has apache2 and open p= ort >> 80 HTTP but couldn???t tell any of these as a vulnerability. >> There is also a part on the report as: >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> I couldn???t update this gvm library, and I couldn???t even find this lib= rary >> to update in the list of packages. All conversations and videos are on Ka= li >> or etc. I have got in touch with the greenbone community and got thia >> reply *"Greenbone >> is not in charge for your version of our software. Therefore you should >> contact the provider of your packages (most likely your distribution) and= >> create a request for updated packages."* >> I also add the report, I hope someone can help me to solve the errors I >> mentioned in the upper text. Sorry if I wrote something unnecessary or >> irrelevant with this page, I am a student and quite new in this field. >> Thank you >=20 >> I Summary >> =3D=3D=3D=3D=3D=3D=3D=3D=3D >> This document reports on the results of an automatic security scan. >> The report first summarises the results found. >> Then, for each host, the report describes every issue found. >> Please consider the advice given in each description, in order to rectify= >> the issue. >> All dates are displayed using the timezone "Coordinated Universal Time", >> which is abbreviated "UTC". >> Vendor security updates are not trusted. >> Overrides are on. When a result has an override, this report uses the >> threat of the override. >> Notes are included in the report.Information on overrides is included in t= he report. >> This report might not show details of all issues that were found. >> It only lists hosts that produced issues. >> Issues with the threat level "Log" are not shown. >> Issues with the threat level "Debug" are not shown. >> Issues with the threat level "False Positive" are not shown. >> Only results with a minimum QoD of 70 are shown. >> This report contains all 12 results selected by the >> filtering described above. Before filtering there were 293 results. >> Scan started: >> Scan ended: =20 >> Task: Server Scanning - Apache2 >> Host Summary >> ************ >> Host High Medium Low Log False Positive >> 172.20.10.2 2 0 0 0 0 >> 172.20.10.4 2 0 0 0 0 >> 172.20.10.12 2 0 0 0 0 >> 172.20.10.11 2 0 0 0 0 >> 172.20.10.8 2 0 0 0 0 >> 172.20.10.1 2 0 0 0 0 >> Total: 6 12 0 0 0 0 >> II Results per Host >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >> Host 172.20.10.2 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.2 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.2 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.4 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.4 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.4 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.12 >> ***************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.12 >> ---------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.12 >> ------------------------------------- >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.11 >> ***************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.11 >> ---------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.11 >> ------------------------------------- >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.8 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.8 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.8 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.1 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.1 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.1 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >=20 >> _______________________________________________ >> freebsd-pkg@freebsd.org mailing list >> https://lists.freebsd.org/mailman/listinfo/freebsd-pkg >> To unsubscribe, send any mail to "freebsd-pkg-unsubscribe@freebsd.org"