Hi, > As soon as those updates hits the feed i will do some further tests.
redone the test and now the OpenVAS results are the same as the ones from Nessus. (Seems there was a problem with that new NVT) Only one system running on port 5061/sip-tls which is vulnerable was not detected by OpenVAS. Unfortunately i'm not allowed to give out the IP address of this system but i have done some more tests: 1. The metasploit module is detecting this vulnerable system 2. nmap -sV -p 5016 ip shows: 5061/tcp open tcpwrapped but no version is shown. 3. The only informations which could be collected is: ssl-cert: Subject: commonName=TANDBERG/organizationName=TANDBERG ASA/stateOrProvinceName=Askerhus/countryName=NO Anyone knows how to collect more informations about this? _______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
