From 9861b9b91d97a443d8c48a392e7caf0458849bd7 Mon Sep 17 00:00:00 2001 From: Tomas Kubla Date: Thu, 30 Dec 2021 16:58:41 +0000 Subject: [PATCH] Nexpose: Add missing REFs --- dojo/tools/nexpose/parser.py | 58 ++++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) diff --git a/dojo/tools/nexpose/parser.py b/dojo/tools/nexpose/parser.py index dee9a47ddd..6004c854a4 100644 --- a/dojo/tools/nexpose/parser.py +++ b/dojo/tools/nexpose/parser.py @@ -287,16 +287,74 @@ def findings(dupe_key, dupes, test, vuln): # build references refs = '' for ref in vuln.get('refs', {}): + # "ADVICE" + # "APPLE" + # "AUSCERT" + # "BEA" if ref.startswith('BID'): refs += f" * [{vuln['refs'][ref]}](https://www.securityfocus.com/bid/{vuln['refs'][ref]})" + # "BUGTRAQ" elif ref.startswith('CA'): refs += f" * [{vuln['refs'][ref]}](https://www.cert.org/advisories/{vuln['refs'][ref]}.html)" + # "CALDERA" + # "CERT" + # "CERT-IN" + # "CERT-TN" elif ref.startswith('CERT-VN'): refs += f" * [{vuln['refs'][ref]}](https://www.kb.cert.org/vuls/id/{vuln['refs'][ref]}.html)" + # "CERT-VU" + # "CIAC" + # "COMPAQ" + # "CONECTIVA" elif ref.startswith('CVE'): refs += f" * [{vuln['refs'][ref]}](https://cve.mitre.org/cgi-bin/cvename.cgi?name={vuln['refs'][ref]})" elif ref.startswith('DEBIAN'): refs += f" * [{vuln['refs'][ref]}](https://security-tracker.debian.org/tracker/{vuln['refs'][ref]})" + # "DISA_SEVERITY" + # "DISA_VMSKEY" + # "EEYE" + # "ENGARDE" + # "ERS" + # "FEDORA" + # "FREEBSD" + # "FRSIRT" + # "GENTOO" + # "IAVM" + # "IBM-TN" + # "IMMUNIX" + # "IDEFENSE" + # "LOTUS" + # "LOTUS-SPR" + # "MANDRAKE" + # "MANDRIVA" + # "MS" + # "MSKB" + # "NETBSD" + # "NOVELL" + # "OPENPKG" + # "OSVDB" + # "OVAL" + # "R7" + # "REDHAT" + # "SANS-00" + # "SANS-01" + # "SANS-02" + # "SANS-03" + # "SANS-04" + # "SANS-05" + # "SANS-06" + # "SANS-07" + # "SCO" + # "SECTRACK" + # "SECUNIA" + # "SECURITYTRACKER" + # "SGI" + # "SLACKWARE" + # "SUN" + # "SUNALERT" + # "SUNPATCH" + # "SUSE" + # "TURBO" elif ref.startswith('XF'): refs += f" * [{vuln['refs'][ref]}](https://exchange.xforce.ibmcloud.com/vulnerabilities/{vuln['refs'][ref]})" elif ref.startswith('URL'):