Hi, On 26.10.2016 15:20, Tomasz Jadowski wrote: > On Wed, Oct 26, 2016 at 03:10:04PM +0200, Christian Fischer wrote: >> Not directly. As long as one of the following binaries are found in the >> PATH of the user for authenticated scans: >> >> php >> php-cli >> php5 >> php7.0 >> >> the detection of PHP should work and you should get a "Linux PHP >> Detection" (OID: 1.3.6.1.4.1.25623.1.0.103592) Log entry with the >> detected PHP version. Based on this Vulnerabilities are reported for the >> detected PHP independently from the distro package names. > > How can I debug this detection? I've checked login into with ssh credentials > manually and scan user has:
the debugging of this detection depends if you're getting the above log entry or not. Also make sure that your Authenticated Scans are actually working correctly. Regarding, -- Christian Fischer | PGP Key: 0x54F3CE5B76C597AD Greenbone Networks GmbH | http://greenbone.net Neuer Graben 17, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460 Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner _______________________________________________ Openvas-plugins mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins
