Netsparker Connector - XML File Connector

Netsparker is a web vulnerability management solution that focuses on scalability, automation, and integration. Netsparker operates within the Dynamic Application Security Testing (DAST) side of Application Security.

To import your data from Netsparker to the Application Security Module, you will need to use the Netsparker Connector under the Dynamic Assessment section of the Cisco Vulnerability Management  UI.


  • You must have access to export data from your NetSparker Deployment in XML format.
  • You must be a Cisco Vulnerability Management Administrator

Configuring your Netsparker Connector in Cisco Vulnerability Management

1. In the Cisco Vulnerability Management UI, click Connectors.
2. Click Add Connector.
3. In the Dynamic Assessment section, click Netsparker.



On the Netsparker page, enter the following information:




  • Name: Enter a name for the connector, or leave it as "Netsparker".

  • Leave the Virtual Tunnel checkbox blank as this is a file-based connector.
  • Asset Inactivity Limit (days): enter a time in days for the connector level asset inactivity limit.
    Cisco recommends 2-3 times the scan cadence of your connector scans.
    • Connector-level asset inactivity limits take precedence over the global inactivity limit. If you do not set an Asset Inactivity Limit, the Global Limit will apply to data ingested by this connector. See Setting Asset Inactivity Limits

5. Click Save.

To run the Connector, upload the Netsparker file on your local machine to the Connector (or drag-and-drop the file). The connector will start processing data and a loading bar will appear.


What Netsparker Items does Cisco Vulnerability Management Import?

Fields in NetSparker

Fields in Cisco Vulnerability Management


parse the domain from the target > URL

Application Identifier

Search for application_identifer in Cisco Vulnerability Management by using the custom query box and typing application:""





vulnerability Status

 We do not map false positives. Since the XML report is structured in a way to only report open vulns, if a vulnerability was reported previously that is no longer reported, the platform will autoclose the “missing” vulnerability.



Information - 0
Low - 3

Medium - 6

High - 9

Critical - 10



Type → (Vulnerability Title)






WASC ID (if present)






Date Formatting

We format differently for American Datetimes (%m/%d/%Y %H:%M:%S) and European Datetimes (%d.%m.%Y %H:%M:%S)

[parameter_details + request_details + response_details + remedy_details]








 There are no Tags in the XML export, and as a result we don’t import any tags.

Optional Settings

The following settings can be enabled on the backend for Netsparker Connectors. To have these settings enabled, or for more information, contact Cisco Support, or your Customer Success Engineer.

Exclude Informationals

When you enable this option, Cisco Vulnerability Management will only import vulnerabilities that include a CVE, CWE, or WASC ID.

Ignore Scanner Last Seen Time

Select this setting if you do not want the asset last seen time in Cisco Vulnerability Management to be the scanner reported last seen time.

Custom Ordered Locators

Locators (such as IP, Netbios, and FQDN) can be reordered to better deduplicate vulnerabilities on the Connector level or the entire Platform level. For more information, see the help article here.

Additional Assistance

Contact Cisco Support if you require any additional assistance with the Netsparker Connector.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request



Please sign in to leave a comment.