Class: Nexpose::VulnerabilitySummary

Inherits:
Vulnerability show all
Defined in:
lib/nexpose/vuln.rb

Overview

Summary of a vulnerability.

Direct Known Subclasses

VulnerabilityDetail

Instance Attribute Summary collapse

Attributes inherited from Vulnerability

#id, #severity, #title

Class Method Summary collapse

Methods inherited from Vulnerability

#initialize

Constructor Details

This class inherits a constructor from Nexpose::Vulnerability

Instance Attribute Details

#addedObject

When this vulnerability was first included in the application.



160
161
162
# File 'lib/nexpose/vuln.rb', line 160

def added
  @added
end

#credentialsObject

A vulnerability is considered “credentialed” when all of its checks require credentials or if the check depends on previous authentication during a scan.



157
158
159
# File 'lib/nexpose/vuln.rb', line 157

def credentials
  @credentials
end

#cvss_scoreObject

The computation of the Common Vulnerability Scoring System indicating compliance with PCI standards on a scale from 0 to 10.0.



173
174
175
# File 'lib/nexpose/vuln.rb', line 173

def cvss_score
  @cvss_score
end

#cvss_vectorObject

How the vulnerability is exploited according to PCI standards.



169
170
171
# File 'lib/nexpose/vuln.rb', line 169

def cvss_vector
  @cvss_vector
end

#modifiedObject

The last date the vulnerability was modified.



163
164
165
# File 'lib/nexpose/vuln.rb', line 163

def modified
  @modified
end

#pci_severityObject

PCI severity value for the vulnerability on a scale of 1 to 5.



148
149
150
# File 'lib/nexpose/vuln.rb', line 148

def pci_severity
  @pci_severity
end

#publishedObject

The date when the information about the vulnerability was first released.



166
167
168
# File 'lib/nexpose/vuln.rb', line 166

def published
  @published
end

#safeObject

Whether all checks for the vulnerability are safe. Unsafe checks may cause denial of service or otherwise disrupt system performance.



152
153
154
# File 'lib/nexpose/vuln.rb', line 152

def safe
  @safe
end

Class Method Details

.parse(xml) ⇒ Object



193
194
195
# File 'lib/nexpose/vuln.rb', line 193

def self.parse(xml)
  parse_attributes(xml)
end

.parse_attributes(xml) ⇒ Object



175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
# File 'lib/nexpose/vuln.rb', line 175

def self.parse_attributes(xml)
  vuln = new(xml.attributes['id'],
             xml.attributes['title'],
             xml.attributes['severity'].to_i)

  vuln.pci_severity = xml.attributes['pciSeverity'].to_i
  vuln.safe = xml.attributes['safe'] == 'true'  # or xml.attributes['safe'] == '1'
  vuln.added = Date.parse(xml.attributes['added'])
  vuln.modified = Date.parse(xml.attributes['modified'])
  vuln.credentials = xml.attributes['requiresCredentials'] == 'true'

  # These three fields are optional in the XSD.
  vuln.published = Date.parse(xml.attributes['published']) if xml.attributes['published']
  vuln.cvss_vector = xml.attributes['cvssVector'] if xml.attributes['cvssVector']
  vuln.cvss_score = xml.attributes['cvssScore'].to_f if xml.attributes['cvssScore']
  vuln
end