> [root@openvas ~]# openvasmd --version
> OpenVAS Manager 3.0.5
> Manager DB revision 56
> Copyright (C) 2010 Greenbone Networks GmbH
> License GPLv2+: GNU GPL version 2 or later
> This is free software: you are free to change and redistribute it.
> There is NO WARRANTY, to the extent permitted by law.
>
> [root@openvas ~]# openvasad --version
> OpenVAS Administrator 1.2.1
> Copyright (C) 2012 Greenbone Networks GmbH
> License GPLv2+: GNU GPL version 2 or later
> This is free software: you are free to change and redistribute it.
> There is NO WARRANTY, to the extent permitted by law.
>
> [root@openvas ~]# openvassd --version
> OpenVAS Scanner 3.3.1
> Nessus origin: (C) 2004 Renaud Deraison <[email protected]>
> Most new code since OpenVAS: (C) 2011 Greenbone Networks GmbH
> License GPLv2: GNU GPL version 2
> This is free software: you are free to change and redistribute it.
> There is NO WARRANTY, to the extent permitted by law.
>
> [root@openvas ~]#
>
>
> [root@openvas ~]# omp -h 127.0.0.1 -u admin -w lolpassword -X "<get_nvts
> />" > /tmp/nvts

You sure that's the command you're using?  The URLs you mentioned would
only appear if you used the details flag.  Maybe just get one of the
problematic NVTs and show us the output.

Hani just backported r16224 to OpenVAS, which solves an escaping issue in
the XREFS element.  But it might be solved in OpenVAS-6 by an older patch
too.

--
Greenbone Networks GmbH
Neuer Graben 17, 49074 Osnabrueck, Germany | AG Osnabrueck, HR B 202460
Executive Directors: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to