OpenVAS Scanner 21.4.1
|
#include "nasl_lex_ctxt.h"
Go to the source code of this file.
Get the kb index of the host running the current script.
[in] | lexic | NASL lexer. |
Return the OID of the current script.
[in] | lexic | NASL lexer. |
If the plugin is a port scanner, it needs to report the list of open ports back to openvas scanner, and it also needs to know which ports are to be scanned.
Get a preferences of the current script.
Search the preference by preference name or by preferences id.
[in] | lexic | NASL lexer. |
Add a cross reference to the meta data.
The parameter "name" of the command defines actually the type, for example "URL" or "OSVDB". The parameter "value" is the actual reference. Alternative to "value", "csv" can be used with a list of comma-separated values.
In fact, if name is "cve" or "bid", it is equivalent to call script_cve_id() or script_bugtraq_id(), for example script_cve_id ("CVE-2019-12345"); is identical to script_xref (name: "cve", value: "CVE-2019-12345");
And also: script_bugtraq_id (12345); is identical to script_xref (name: "bid", value: "12345"); (watch out that the number now needs to be a string).
This even works with multiple comma-separated elements like script_xref (name: "cve", csv: "CVE-2019-12345,CVE-2019-54321");
lexic | The parser context. |
Send a security message to the client.
[in] | lexic | NASL lexer. |