} break; case "new": if (intval($user) != -1) { $owner = $user; } elseif (intval($entity) != -1) { $owner = $entity; } if ($owner == "") { $owner = Session::get_session_user(); } if ($sensor_id != "") { $result = Vulnerabilities::create_sensor_profile($dbconn, $sensor_id, $sname, $owner, $cloneid); // OMP sensor } else { $result = Vulnerabilities::create_db_profile($dbconn, $sname, $sdescription, $sautoenable, $owner, $cloneid, $tracker, $_POST); } break; case "delete_sensor_profile": $result = Vulnerabilities::delete_sensor_config($dbconn, $sensor_id, $sid); break; case "delete_db_profile": $result = Vulnerabilities::delete_db_profile($dbconn, $sid); break; default: $result = array("status" => "error", "message" => _("Invalid option")); } if (preg_match("/Failed to acquire socket/", $result["message"])) { $result["message"] = _("Unable to connect to sensor, please check sensor status and Vuln Scanner Options."); } $result["message"] = preg_replace("/\\s+'\\s*'\\s+/", "", $result["message"]);