-
-
Notifications
You must be signed in to change notification settings - Fork 22
Open
Description
openvas_to_report/libs/data/parsed_data.py
this pattern should extraxt correct information (without description)
i'am not sure if this is the correct line that it searches, but using the patten below you can extract the port and protocol information:
<port>22/tcp<host>xxx.xxx.xxx.xxx</host><severity>5.3</severity><threat>Medium</threat></port>
change number of groups to 3(line 100), and remove return of description(line 107)
pattern: ([\d]+)(/)([\w]+)
lilloxxx
Metadata
Metadata
Assignees
Labels
No labels
