NamicSoft field names

You are here:
< Back

All available fields in NamicSoft

NamicSoft field name Data type Description Example value
bid_numbers TEXT Bug traq IDs 32319
canvas_package TEXT Name of the Canvas exploit package
compliance_actual_value TEXT Relevant output from the compliance check
compliance_audit_file TEXT The audit file that invoked the compliance check
compliance_check_id TEXT The ID number of the compliance check
compliance_check_name TEXT The numeric ID and short name of the compliance check
compliance_info TEXT Information about a compliance check
compliance_policy_value TEXT Policy value
compliance_result TEXT Result from the compliance check PASSED
cve_numbers TEXT CVE numbers CVE-2008-5161
Cvss3BaseScore TEXT CVSS3 base score 6.4
Cvss3Vector TEXT CVSS3 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Cvss3_temporal_score TEXT Cvss3 temporal score 7.2
cvssBaseScore TEXT CVSS base score 6.4
cvssVector TEXT CVSS vector CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
cvss_temporal_score TEXT Cvss temporal score 7.2
description TEXT Description of the vulnerability The server’s X.509 certificate does not have a signature from a known public……
exploitability_ease TEXT Description of how easy it is to exploit the vulnerability Exploits are available
exploit_available TEXT Does an exploit exist for the vulnerability? true
exploit_framework_canvas TEXT Does an exploit exist in Canvas? True
exploit_framework_metasploit TEXT Does an exploit exist in the Metasploit framework? True
fqdn TEXT Fully qualified port name Host.isp.com
id INTEGER Unique id (PRIMARY KEY) 1
ip TEXT IP address 192.168.0.1
ipSortValue INTEGER Integer representation of an IP address. Can be used for IP address sorting. -1062731666
hostName TEXT Host Name MyHost
macAddress TEXT Mac Address 24:ec:99:6d:f3:5e
metasploit_name TEXT Name of the metasploit module (if one exists)
netbiosName TEXT Netbios name METASPLOITABLE
operatingSystem TEXT Operating system Microsoft Windows 7 Home
patchPublicationDate TEXT Patch publication date 2010/12/15
pluginFamily TEXT Nessus plugin family Web Servers
pluginID TEXT Nessus plugin ID 24260
pluginModificationDate TEXT Plugin modification date 2010/12/15
pluginName TEXT Nessus plugin name HyperText Transfer Protocol (HTTP) Information
plugin_output TEXT Output from the Nessus plugin that discovered the vulnerability
pluginPublicationDate TEXT Plugin publication date 2010/12/15
pluginType TEXT Nessus plugin type Remote
pluginVersion TEXT Nessus plugin version
port INTEGER Port number 80
protocol TEXT Protocol Tcp
reportName TEXT Path of the nessus file where the host has been retrieved from. C:\scans\myscan.nessus
riskFactor TEXT Risk factor based on CVSS Medium
scanEnded TEXT Scan end time of the host Sun Jan 12 13:05:15 2014
scanEndedIso TEXT Scan end time of the host (ISO-8601 format) Sun Jan 12 13:05:15 2014
scanStarted TEXT Scan start time of the host Sun Jan 12 13:05:15 2014
scanStartedIso TEXT Scan start time of the host (ISO-8601 format) 2016-08-13 20:50:00
see_also TEXT Links to more information about the vulnerability https://www.namicsoft.com
service TEXT Service name www
severity TEXT Severity in text Low
severityNumber INTEGER Severity as an integer. Can be used for sorting of severites. 1
solution TEXT Solution of how to deal with the vulnerability Upgrade to the latest version available by the vendor
sourcePath TEXT Path to the read report in nessusv2 format. C:\scans\myscan.nessus
sourceTool TEXT Source tool where the vulnerability was found Nessus
stigSeverity TEXT Stig severity
synopsis TEXT Synopsis The SSL certificate for this service cannot be trusted.
systemType TEXT Type of system general-purpose
vulnerabilityPublicationDate TEXT Date when vulnerability was presented.
vulnerability_fixed TEXT NamicSoft specific. Can be used by users to set if the vulnerability has been fixed or not. True
vulnerability_fixed_date TEXT NamicSoft specific. The date when vulnerability was fixed. 2014-08-08