Using Filters

You can filter the vulnerabilities that will be presented in you report using one of the filtering options. You can filter: - networks cidrs, ip ranges and any individual ip using the options -n/--network-include and -N/--network-exclude; - regex expressions that will be matched against the vulnerability names using the options -r/--regex-include and -R/--regex-exclude - The matches will be case insensitive; - CVEs numbers in the format CVEYYYY-nnn... using the options -e/--cve-include and -E/--cve-exclude; When passing the --format csv parameter, the tool will export reports in Comma Separated Values (CSV) format.

All these options receive the path to a .txt file containing one filtering option by line.


Create xlsx report from multiple OpenVAS XML Report filtering by network

openvasreporting -i *.xml -n ./branch_1.txt -N ./branch_1_ipaliases.txt

Contents of branch_1.txt could be:

Contents of branch_1_ipaliases.txt could be:

Create xlsx report, sorted by host, filtering by regex

openvasreporting -i *.xml -T host -R ./regex_defender.txt

Contents of regex_defender.txt could be:


Create xlss report from 1 OpenVAS XML report, filtering by CVE

openvasreporting -i openvasreport.xml -e ./cisa_nov_2021.txt

Contents of cisa_nov_2021.txt could be


Of course, you can mix filtering options:

openvasreporting -i *.xml -r ./regex_defender.txt -e ./cisa_nov_2021.txt