Skip to content

Retrieving exploit information from Nessus / Tenable scans #9736

Answered by manuel-sommer
SeaofThought asked this question in Q&A
Discussion options

You must be logged in to vote

Hi @SeaofThought,

I guess you are talking about multiple problems here.

  1. The code for the parser is not good enough to parse all relevant information and should be improved. For that, could you please define in a more precise way within a new github issue (and maybe include there a sample output file, if the scan outputs are not enough) which information you exactly need or what exactly you would expect. I am guessing that you would like to have "exploitability_ease" within the finding description, is this right?
  2. If the information is not available within DefectDojo, it can't be exported (csv). This has to be tested after the parser parses the relevant information.
  3. An available exploit ca…

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@manuel-sommer
Comment options

Answer selected by mtesauro
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants