for ($xc->findnodes( 'fndvuln', $host)) { $fnd_vuln_id = $_->findvalue('./@id'); print "\n"; print $fnd_vuln_id . "\n"; $commonRecord{"nCircleVulnID"} = $fnd_vuln_id; # The Vulnerabliliy descriptions are in /audit/vulnerabilities for $vuln ( $xc->findnodes("/audit/vulnerabilities/vuln[\@id = '$fnd_vuln_id']")) { $commonRecord{"nCircleVulnName"} = $xc->findvalue('vname', $vuln); $commonRecord{"nCircleVulnScore"} = $xc->findvalue('vscore', $vuln); $commonRecord{"nCircleVulnRisk"} = $xc->findvalue('risk', $vuln); $commonRecord{"nCircleVulnSkill"} = $xc->findvalue('skill', $vuln); $commonRecord{"nCircleVulnStrategy"} = $xc->findvalue('strategy', $vuln); $commonRecord{"nCircleVulnDesc"} = &clean( $xc->findvalue( 'vdescription', $vuln)); # This is where the issue is: if ( $xc->findnodes( 'advisories/cve', $vuln )) { for ( $xc->findvalue( 'advisories/cve', $vuln )) { print $_ . "\n"; push ( @cve_records, $_ ); } } } #### SNMP System Description Available (system.sysDescr) 48 Exposure Automated Exploit Network Reconnaissance The SNMP System Description (sys.sysDescr, OID=.iso.3.6.1.2.1.1.1.0) is remotely available. This can give detailed operating system, build, and version information about the target. CVE: CVE-1999-0516 CVE: CVE-1999-0517 #### 3522 CVE: CVE-1999-0516CVE: CVE-1999-0517