for ($xc->findnodes( 'fndvuln', $host)) {
$fnd_vuln_id = $_->findvalue('./@id');
print "\n";
print $fnd_vuln_id . "\n";
$commonRecord{"nCircleVulnID"} = $fnd_vuln_id;
# The Vulnerabliliy descriptions are in /audit/vulnerabilities
for $vuln ( $xc->findnodes("/audit/vulnerabilities/vuln[\@id = '$fnd_vuln_id']")) {
$commonRecord{"nCircleVulnName"} = $xc->findvalue('vname', $vuln);
$commonRecord{"nCircleVulnScore"} = $xc->findvalue('vscore', $vuln);
$commonRecord{"nCircleVulnRisk"} = $xc->findvalue('risk', $vuln);
$commonRecord{"nCircleVulnSkill"} = $xc->findvalue('skill', $vuln);
$commonRecord{"nCircleVulnStrategy"} = $xc->findvalue('strategy', $vuln);
$commonRecord{"nCircleVulnDesc"} = &clean( $xc->findvalue( 'vdescription', $vuln));
# This is where the issue is:
if ( $xc->findnodes( 'advisories/cve', $vuln )) {
for ( $xc->findvalue( 'advisories/cve', $vuln )) {
print $_ . "\n";
push ( @cve_records, $_ );
}
}
}
####
SNMP System Description Available (system.sysDescr)
48
Exposure
Automated Exploit
Network Reconnaissance
The SNMP System Description (sys.sysDescr, OID=.iso.3.6.1.2.1.1.1.0) is remotely available. This can give detailed operating system, build, and version information about the target.
CVE: CVE-1999-0516
CVE: CVE-1999-0517
####
3522
CVE: CVE-1999-0516CVE: CVE-1999-0517