From owner-freebsd-pkg@freebsd.org Fri Sep 25 16:01:46 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4944A3FBEEB for ; Fri, 25 Sep 2020 16:01:46 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Byc9P1MXnz48W9; Fri, 25 Sep 2020 16:01:44 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id DF3753C0199; Fri, 25 Sep 2020 16:01:43 +0000 (UTC) Date: Fri, 25 Sep 2020 16:01:43 +0000 From: Brooks Davis To: "Yigithan Bilge (Student)" Cc: Brooks Davis , freebsd-pkg@freebsd.org, acm@freebsd.org Subject: Re: FreeBSD OpenVAS Configuration Message-ID: <20200925160143.GA84172@spindle.one-eyed-alien.net> References: <20200924164146.GA64154@spindle.one-eyed-alien.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="NzB8fVQJ5HfG6fxh" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-Rspamd-Queue-Id: 4Byc9P1MXnz48W9 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of brooks@spindle.one-eyed-alien.net has no SPF policy when checking 199.48.129.229) smtp.mailfrom=brooks@spindle.one-eyed-alien.net X-Spamd-Result: default: False [-3.15 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.01)[-1.010]; FREEFALL_USER(0.00)[brooks]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.02)[-1.015]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; AUTH_NA(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.22)[-0.224]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; RCVD_COUNT_ZERO(0.00)[0]; R_SPF_NA(0.00)[no SPF record]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:36236, ipnet:199.48.128.0/22, country:US]; FROM_NEQ_ENVFROM(0.00)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; MAILMAN_DEST(0.00)[freebsd-pkg] X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Sep 2020 16:01:46 -0000 --NzB8fVQJ5HfG6fxh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable No one has created a GVM port yet. The openvas ports should probably be deleted as you've demonstrated they aren't particularly useful. -- Brooks On Fri, Sep 25, 2020 at 01:54:40PM +0300, Yigithan Bilge (Student) wrote: > Thank you, but in the site you shared there are new packages named gvm-li= bs and old packages named openvas. I can???t find and download new packages= , there is no reply for ???pkg search gvm-libs??? command in the freebsd. H= ow can I get these new updated packages? Do you have any idea? > Thanks, > ygthn >=20 > > Brooks Davis ??unlar?? yazd?? (24 Eyl 2020 19:41): > >=20 > > ???It appears that OpenVAS is complaining about itself in a confusing a= nd > > unhelpful way. According to the following page, GVM is new branding for > > OpenVAS. > >=20 > > https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management > >=20 > > -- Brooks > >=20 > >>> On Thu, Sep 24, 2020 at 01:42:41PM +0300, Yigithan Bilge (Student) wr= ote: > >> Hey, > >> I currently work on a project to scan a network and find vulnerabiliti= es > >> which has to be on FreeBSD. So, as a first step, I installed packages = of > >> openvas9 and scanned the network by using the web interface. There is = also > >> a server on ubuntu to see what openvas will find. > >> On the report, there is a vulnerability called ???Report outdated / > >> end-of-life Scan Engine / Environment (local)??? which makes me think = the > >> system isn???t working quite well since the server has apache2 and ope= n port > >> 80 HTTP but couldn???t tell any of these as a vulnerability. > >> There is also a part on the report as: > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> I couldn???t update this gvm library, and I couldn???t even find this = library > >> to update in the list of packages. All conversations and videos are on= Kali > >> or etc. I have got in touch with the greenbone community and got thia > >> reply *"Greenbone > >> is not in charge for your version of our software. Therefore you should > >> contact the provider of your packages (most likely your distribution) = and > >> create a request for updated packages."* > >> I also add the report, I hope someone can help me to solve the errors I > >> mentioned in the upper text. Sorry if I wrote something unnecessary or > >> irrelevant with this page, I am a student and quite new in this field. > >> Thank you > >=20 > >> I Summary > >> =3D=3D=3D=3D=3D=3D=3D=3D=3D > >> This document reports on the results of an automatic security scan. > >> The report first summarises the results found. > >> Then, for each host, the report describes every issue found. > >> Please consider the advice given in each description, in order to rect= ify > >> the issue. > >> All dates are displayed using the timezone "Coordinated Universal Time= ", > >> which is abbreviated "UTC". > >> Vendor security updates are not trusted. > >> Overrides are on. When a result has an override, this report uses the > >> threat of the override. > >> Notes are included in the report.Information on overrides is included = in the report. > >> This report might not show details of all issues that were found. > >> It only lists hosts that produced issues. > >> Issues with the threat level "Log" are not shown. > >> Issues with the threat level "Debug" are not shown. > >> Issues with the threat level "False Positive" are not shown. > >> Only results with a minimum QoD of 70 are shown. > >> This report contains all 12 results selected by the > >> filtering described above. Before filtering there were 293 results. > >> Scan started: > >> Scan ended: =20 > >> Task: Server Scanning - Apache2 > >> Host Summary > >> ************ > >> Host High Medium Low Log False Positive > >> 172.20.10.2 2 0 0 0 0 > >> 172.20.10.4 2 0 0 0 0 > >> 172.20.10.12 2 0 0 0 0 > >> 172.20.10.11 2 0 0 0 0 > >> 172.20.10.8 2 0 0 0 0 > >> 172.20.10.1 2 0 0 0 0 > >> Total: 6 12 0 0 0 0 > >> II Results per Host > >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > >> Host 172.20.10.2 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.2 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.2 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.4 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.4 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.4 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.12 > >> ***************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.12 > >> ---------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.12 > >> ------------------------------------- > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.11 > >> ***************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.11 > >> ---------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.11 > >> ------------------------------------- > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.8 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.8 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.8 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.1 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.1 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.1 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >=20 > >> _______________________________________________ > >> freebsd-pkg@freebsd.org mailing list > >> https://lists.freebsd.org/mailman/listinfo/freebsd-pkg > >> To unsubscribe, send any mail to "freebsd-pkg-unsubscribe@freebsd.org" >=20 --NzB8fVQJ5HfG6fxh Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJfbhRnAAoJEKzQXbSebgfAHB0IAKImuKioz+WgPC4cDQvcyQZA wDbJ8CXzjnZsNspk/ZUjlNErplzjJhv4Q3YmC/SBgPQe9SNC8k48KOTdc5n1fVMV NCzfTVxxEX+YjIgEFLRV+B0gclrjdg/lIlGeJZJ1gES21jDV/hiqvCbiUwHW5bHU 5vF6hqwvvWISPG4XPUq7ycnyuvWYtyevWmqndnEVc/6Bz34Qsfcqz4Le10EV+R4Q HnSo1E5Sh48axNpBO/tJ5XfcM3cgyrEjQ0cg1AeUWJ8dXok+Ci2W6WHF/A9o/0jX t6+cApwzL3NEfRqL2RuwEG3FtOYVF0OGiR/vdQwIKBCXzz8OgO+2RRxpYl4fOcU= =IjwQ -----END PGP SIGNATURE----- --NzB8fVQJ5HfG6fxh--