It shows "windows" as the affected OS.But our scan was on "Enterprise Linux".We 
are unsure on how to proceed further with this vulnerability. 

    On Wednesday, 25 May 2016 3:23 PM, Michael Meyer 
<michael.me...@greenbone.net> wrote:
 

 *** Reindl Harald wrote:
> Am 25.05.2016 um 10:54 schrieb Michael Meyer:
> >*** Reindl Harald wrote:
> >
> >>i find it just somehow laughable to scan in 2016/05 a 2.4.7 httpd
> >
> >man backports
> 
> you missed that he talks about windows as OS and not a enterprise linux

Damn...:)

Micha

-- 
Michael Meyer                  OpenPGP Key: 0xAF069E9152A6EFA6 
http://www.greenbone.net/
Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

  
_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to