mpicard / pyvas

OpenVAS Management Protocol Client for Python
MIT License
23 stars 10 forks source link

how to get all the vulnerabilities from the pyvas report #15

Closed ashleyabraham closed 6 years ago

ashleyabraham commented 6 years ago

I am able to read a report using PyVAS, the reports = cli.list_reports() returns all the available reports, I'm traversing through each one of them reports.data[i]['report']['results']['result'] and I see only 10 of the vulnerabilities, how do I get all of them using PyVAS?

mpicard commented 6 years ago

Hm I don't have openvas setup right now. I'd be happy to take a PR if you find the issue though

ghost commented 6 years ago

I've been working on a fork of pyvas, and will be looking at extracting details from list_reports(). It may be an issue with passing parameters to OMP. As I've had to rewrite get_config() in order to extract all the information possible.

mpicard commented 6 years ago

Awesome! PRs are always welcome! I haven’t had time to dig into this too much but I’d be happy to review a fix and merge it! On Fri, May 11, 2018 at 2:32 PM Anna Langley notifications@github.com wrote:

I've been working on a fork of pyvas, and will be looking at extracting details from list_reports(). It may be an issue with passing parameters to OMP. As I've had to rewrite get_config() in order to extract all the information possible.

— You are receiving this because you commented.

Reply to this email directly, view it on GitHub https://github.com/mpicard/pyvas/issues/15#issuecomment-388364530, or mute the thread https://github.com/notifications/unsubscribe-auth/AHHYRoyk_zsC1_lw3rx8e912vvjsojTJks5txZL2gaJpZM4SOWXo .

mpicard commented 6 years ago

Expired, you can email me at martin8768@gmail.com if you want

ashleyabraham commented 6 years ago

I was able to get all the vulnerabilities through get_reports()

    ovas_report = cli.get_report(report['report']['@id'])
    for result in ovas_report.data['report']['results']['result']:
        ...
ghost commented 6 years ago

Hey ash84, thank you!