Cisco Cisco Firepower Management Center 2000 开发者指南
6-56
FireSIGHT System Database Access Guide
Chapter 6 Schema: Discovery Event and Network Map Tables
rna_vuln
rna_vuln Fields
The following table describes the fields you can access in the
rna_vuln
table.
Table 6-51
rna_vuln Fields
Field
Description
authentication
Whether authentication is required to exploit the vulnerability:
•
Required
•
Not Required
•
Unknown
availability
When the vulnerability can be exploited:
•
Always
•
User Initiated
•
Time Dependent
•
Unknown
available_exploits
Whether there are available exploits for the vulnerability:
•
TRUE
•
FALSE
bugtraq_id
The identification number associated with the vulnerability in the Bugtraq database.
class
The class of vulnerability:
•
Configuration Error
•
Boundary Condition Error
•
Design Error
credibility
How credible the vulnerability is:
•
Conflicting Reports
•
Conflicting Details
•
Single Source
•
Reliable Source
•
Multiple Sources
•
Vendor Confirmed
credit
The person or organization credited with reporting the vulnerability.
ease
The ease of exploiting the vulnerability:
•
No Exploit Required
•
Exploit Available
•
No Exploit Available
effect
Details on what could happen when the vulnerability is exploited.
entry_date
The date the vulnerability was entered in the database.
exploit
Information on where you can find exploits for the vulnerability.