Cisco Cisco Firepower Management Center 2000 开发者指南

下载
页码 180
 
6-56
FireSIGHT System Database Access Guide
 
Chapter 6      Schema: Discovery Event and Network Map Tables 
  rna_vuln
rna_vuln Fields
The following table describes the fields you can access in the 
rna_vuln
 table.
Table 6-51
rna_vuln Fields 
Field
Description
authentication
Whether authentication is required to exploit the vulnerability:
  •
Required
  •
Not Required
  •
Unknown
availability
When the vulnerability can be exploited:
  •
Always
  •
User Initiated
  •
Time Dependent
  •
Unknown
available_exploits
Whether there are available exploits for the vulnerability:
  •
TRUE
  •
FALSE
bugtraq_id
The identification number associated with the vulnerability in the Bugtraq database.
class
The class of vulnerability: 
  •
Configuration Error
  •
Boundary Condition Error
  •
Design Error
credibility
How credible the vulnerability is:
  •
Conflicting Reports
  •
Conflicting Details
  •
Single Source
  •
Reliable Source
  •
Multiple Sources
  •
Vendor Confirmed
credit
The person or organization credited with reporting the vulnerability.
ease
The ease of exploiting the vulnerability:
  •
No Exploit Required
  •
Exploit Available
  •
No Exploit Available
effect
Details on what could happen when the vulnerability is exploited.
entry_date
The date the vulnerability was entered in the database.
exploit
Information on where you can find exploits for the vulnerability.