Cisco Cisco Firepower Management Center 4000 Entwickleranleitung
Version 5.3
Sourcefire 3D System eStreamer Integration Guide
177
Understanding Discovery & Connection Data Structures
Metadata for Discovery Events
Chapter 4
The
table describes the fields in the Vulnerability
record.
Vulnerability Record Fields
F
IELD
D
ATA
T
YPE
D
ESCRIPTION
Vulnerability ID
uint32
The vulnerability ID number.
Impact
uint32
The vulnerability impact, corresponding to the
impact level determined through correlation of
intrusion data, host discovery events, and
vulnerability assessments. The value can be
from 1 to 10, with 10 being the most severe.
The impact value of a vulnerability is
determined by the writer of the Bugtraq entry.
Exploits
uint8
Indicates whether known exploits exist for the
vulnerability. Possible values include:
•
•
0
— Yes
•
1
— No
Remote
uint8
Indicates whether the vulnerability can be
exploited across a network. Possible values
include:
•
•
0
— Yes
•
1
— No
• Blank — Vulnerability to remote exploits
unknown
Entry Date
Length
uint32
The length of the entry date field.
Entry Date
string
The date the vulnerability was entered in the
database.
Published Date
Length
uint32
The length of the published date field.
Published Date
string
The date the vulnerability was published.
Modified Date
Length
uint32
The length of the modified date field.
Modified Date
string
The date of the most recent modification to
the vulnerability, if applicable.
Title Length
uint32
The length of the title field.