diff --git a/PentestMapper.py b/PentestMapper.py index 8d49b58..c874c2b 100644 --- a/PentestMapper.py +++ b/PentestMapper.py @@ -918,7 +918,8 @@ def sendVulnItem(self,event): def sendRepeaterItem(self,event): row = self.logTable.getSelectedRows() for rows in row: - logEntry = self._log[rows] + modelRowIndex = self.logTable.convertRowIndexToModel(rows) + logEntry = self._log[modelRowIndex] fullurl = logEntry._url url = urlparse(str(fullurl)) hostname = url.hostname @@ -936,15 +937,18 @@ def sendRepeaterItem(self,event): def deleterow(self,event): row = self.logTable.getSelectedRows() + for rows in sorted(row, reverse=True): - self._log.pop(rows) + modelRowIndex = self.logTable.convertRowIndexToModel(rows) + self._log.pop(modelRowIndex) self.fireTableDataChanged() # delete row from the vulnerability table def deletevuln(self,e): totalvulnrows = self.table3.getSelectedRows() for rows in sorted(totalvulnrows, reverse=True): - self.dataModel2.removeRow(rows) + modelRowIndex = self.table3.convertRowIndexToModel(rows) + self.dataModel2.removeRow(modelRowIndex) # allow users to search vulnerablity from select vulnerablity list in vulnerability table