Пример #1
0
*
* Otherwise you can read it here: http://www.gnu.org/licenses/gpl-2.0.txt
*
*/
require_once 'av_init.php';
require_once 'incident_common.php';
Session::logcheck("analysis-menu", "IncidentsIncidents");
//DB connection
$db = new ossim_db();
$conn = $db->connect();
//Tags
$incident_tag = new Incident_tag($conn);
$tag_list = $incident_tag->get_list();
//Load users and entities (Autocomplete)
$autocomplete_keys = array('users', 'entities');
$users_and_entities = Autocomplete::get_autocomplete($conn, $autocomplete_keys);
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
	<title> <?php 
echo gettext("OSSIM Framework");
?>
 </title>
	<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>
	<meta http-equiv="Pragma" content="no-cache"/>
    <link rel="stylesheet" type="text/css" href="../style/av_common.css?t=<?php 
echo Util::get_css_id();
?>
"/>
	<link rel="stylesheet" type="text/css" href="../style/tipTip.css"/>
Пример #2
0
                ${$pp} = Util::htmlentities(escape_sql(trim($_POST[$pp]), $conn));
            } else {
                ${$pp} = "";
            }
        }
        break;
}
$offset = intval($offset);
// latest results table
$roffset = intval($roffset);
// reports table
$sreport = intval($sreport);
// to show reports
//for autocomplete input
$autocomplete_keys = array('hosts_ips', 'nets_cidrs', 'sensors');
$assets = Autocomplete::get_autocomplete($dbconn, $autocomplete_keys);
// ctx permissions
$perms_where = Session::get_ctx_where() != "" ? " AND ctx in (" . Session::get_ctx_where() . ")" : "";
list($arruser, $user) = Vulnerabilities::get_users_and_entities_filter($conn);
// Delete Section
if (!empty($delete) && !empty($scantime)) {
    // a single scan in latest results tables
    $params = array($delete, $scantime);
    $query = "SELECT hostIP, HEX(ctx) as ctx, sid, username FROM vuln_nessus_latest_reports WHERE report_key=? and scantime=? {$perms_where}";
    $result = $dbconn->execute($query, $params);
    if (Session::hostAllowed_by_ip_ctx($dbconn, $result->fields["hostIP"], $result->fields["ctx"])) {
        $dhostIP = $result->fields["hostIP"];
        $dctx = $result->fields["ctx"];
        $dusername = $result->fields["username"];
        $dsid = $result->fields["sid"];
        $query = "DELETE FROM vuln_nessus_latest_reports WHERE report_key=? and scantime=? {$perms_where}";
        Alarm::close($conn, POST('alarm'));
    } else {
        die(ossim_error("Can't do this action for security reasons."));
    }
}
if (POST('action') == "delete_alarm") {
    if (check_uniqueid($prev_unique_id, $param_unique_id)) {
        Alarm::delete($conn, POST('alarm'));
    } else {
        die(ossim_error("Can't do this action for security reasons."));
    }
}
$sensors = Av_sensor::get_list($conn, array(), FALSE, TRUE);
//Autocompleted
$autocomplete_keys = array('hosts');
$hosts_str = Autocomplete::get_autocomplete($conn, $autocomplete_keys);
$db_groups = Alarm_groups::get_dbgroups($conn);
list($alarm_group, $count) = Alarm_groups::get_grouped_alarms($conn, $group_type, $show_options, $hide_closed, $date_from, $date_to, $src_ip, $dst_ip, $sensor_query, $query, $directive_id, $intent, $num_events, $num_events_op, $tag, "LIMIT {$inf}, {$rows}", true);
?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
	<title> <?php 
echo _("Control Panel");
?>
 </title>
	<meta http-equiv="Pragma" content="no-cache"/>
	<link rel="stylesheet" href="../style/av_common.css?t=<?php 
echo Util::get_css_id();
?>