ID | 31 |{{ cve['id'] }} | 32 |||||||
Summary | 35 |{{ cve['summary'] }} | 36 |||||||
References | 39 |
40 |
41 |
47 |
|
48 | ||||||
Vulnerable Configurations | 51 |
52 |
53 |
68 |
|
69 | ||||||
CVSS | 72 |
73 |
|
79 | ||||||
CWE | 84 |{{ cve['cwe'] }} | 85 |||||||
CAPEC | 92 |
93 |
94 |
113 |
|
114 | ||||||
Access | 120 |
121 |
|
130 | ||||||
Impact | 135 |
136 |
|
145 | ||||||
{{ k[0]|vFeedName }} vFeed | 152 |
153 |
|
173 | ||||||
Last major update | 178 |{{ cve['Modified']|currentTime }} | 179 |||||||
Published | 182 |{{ cve['Published']|currentTime }} | 183 |||||||
Last modified | 187 |{{ cve['last-modified']|currentTime }} | 188 |
Scanned on | {{scan['scan']['time']|fromEpoch}} |
Scan Type | {{scan['scan']['type']}} |
Enhanced on | {{scan['enhanced']['time']|fromEpoch}} |
IP | {{sys['ip']}} | |||||||||||||||
MAC | {{sys['mac']}} | |||||||||||||||
Status | {{sys['status']}} | |||||||||||||||
Possible CPEs | 53 |
54 | {% if sys['cpes']|length == 0 %}
55 | System not recognized
56 | {% else %}
57 | {%for cpe in sys['cpes'] %}
58 |
59 | {{ cpe['cpe']|toHuman }}
60 | {% if cpe['cves']|length!=0 %}
61 |
62 |
63 |
64 | {% endif %}
65 |
101 | {% endfor %}
102 | {% endif %}
103 |
66 | {% for v in cpe['cves'] %}
67 | {{v['id']}}
68 | {% if 'impact' in v %} -
69 |
70 | C
71 | I
72 | A
73 |
74 | {% endif %}
75 | {% if 'access' in v %}
76 | {% if v['access']['vector']|lower == 'local'%}
77 |
78 | {% elif v['access']['vector']|lower == 'network'%}
79 |
80 | {% elif v['access']['vector']|lower == 'adjacent_network'%}
81 |
82 | {% endif %}
83 | {% if v['access']['complexity']|lower == 'low'%}
84 |
85 | {% elif v['access']['complexity']|lower == 'medium'%}
86 |
87 | {% elif v['access']['complexity']|lower == 'high'%}
88 |
89 | {% endif %}
90 | {% endif %}
91 | {% if 'map_cve_exploitdb' in v %}
92 |
93 | {% endif %}
94 | {% if 'map_cve_msf' in v %}
95 |
96 | {% endif %}
97 |
100 | 98 | {% endfor %} 99 | |
104 | {% if sys['status']=='up'%}
105 | |||||||||||||||
Vendor | {{sys['vendor']}} | |||||||||||||||
Hostnames | 107 |
108 |
|
114 | |||||||||||||||
Distance | {{sys['distance']}} | |||||||||||||||
Services | 117 |
118 | {% if sys['services']|length == 0 %}
119 | No services found for this host
120 | {% else %}
121 |
|
185 |
Scanned on | {{scan['time']}} |
Scan Type | {{scan['type']}} |
Enhanced on | {{enhanced['time']}} |
IP | {{sys['ip']}} | ||||||||||
MAC | {{sys['mac']}} | ||||||||||
Status | {{sys['status']}} | ||||||||||
Possible CPEs | 30 |
31 | {% if sys['cpes']|length == 0 %}
32 | System not recognized
33 | {% else %}
34 |
|
44 | ||||||||||
Vendor | {{sys['vendor']}} | ||||||||||
Hostnames | 48 |
49 |
|
53 | ||||||||||
Distance | {{sys['distance']}} | ||||||||||
Services | 56 |
57 | {% if sys['services']|length == 0 %}
58 | No services found for this host
59 | {% else %}
60 |
|
78 |
CVE |
89 | Confidentiality |
90 | Integrity |
91 | Availability |
92 | Complexity |
93 | Authentication |
94 | Vector |
95 | Exploit DB |
96 | MSF |
97 | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
{{ cve["id"] }} | 101 | {% if "impact" in cve %} 102 |{{ cve["impact"]["confidentiality"][0] }} | 103 |{{ cve["impact"]["integrity"][0] }} | 104 |{{ cve["impact"]["availability"][0] }} | 105 | {% else %} 106 |? | ? | ? | 107 | {% endif %} 108 | {% if "access" in cve %} 109 |{{ cve["access"]["complexity"][0] }} | 110 |{{ cve["access"]["authentication"][0] }} | 111 |{{ cve["access"]["vector"][0] }} | 112 | {% else %} 113 |? | ? | ? | 114 | {% endif %} 115 | {% if "map_cve_exploitdb" in cve %}x | {% else %}{% endif %} 116 | {% if "map_cve_msf" in cve %} | x | {% else %}{% endif %} 117 | |
Impact | 124 |
125 |
127 | |
132 |
133 | Access | 134 |
135 |
137 |
143 |
149 | |
154 |