Adv_Osvdb_Details_V - Novell SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010 Reference Manual

Hide thumbs Also See for SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010:
Table of Contents

Advertisement

Column Name
CREATED_BY
MODIFIED_BY

8.1.9 ADV_OSVDB_DETAILS_V

This view contains information about the known vulnerablities from the OSVDB for the products
supported by Novell for Advisor. It also stores the classifications to which the vulnerability applies.
Column Name
OSVDB_ID
OSVDB_TITLE
DESCRIPTION
URGENCY
SEVERITY
ATTACK_TYPE_AUTH_MANAGE
ATTACK_TYPE_CRYPT
ATTACK_TYPE_DOS
ATTACK_TYPE_HIJACK
ATTACK_TYPE_INFO_DISCLOSE
ATTACK_TYPE_INFRASTRUCT
ATTACK_TYPE_INPUT_MANIP
130 Sentinel 6.1 Reference Guide
Datatype
Comment
int
ID of the user who entered the mapping information in
the Sentinel database.
int
ID of the user who modified the mapping information in
the Sentinel database.
Datatype
Comment
int
The unique ID of the vulnerability in the OSVDB.
varchar (256)
The normalized name of the vulnerability.
text
A brief description of the vulnerability.
int
Indicates the urgency of the vulnerability. The
rating is 1- 10. The higher the number, the more
urgent the vulnerability.
int
Indicates the severity of the vulnerability. The
rating is 1- 10. The higher the number, the more
urgent the vulnerability.
bit
This value is 1 if the attack type is authentication
management. For example, brute force attack,
default password, and cookie poisoning.
bit
This value is 1 if the attack type is cryptographic.
For example, weak encryption (implementation or
algorithm), no encryption (plaintext), and sniffing.
bit
This value is 1 if the attack type is denial of
service. For example, saturation flood, crash,
lock up, and forced reboot.
bit
This value is 1 if the attack type is hijack. For
example, man-in-the-middle attacks, IP spoofing,
session timeout or take-over, and session replay.
bit
This value is 1 if the attack type is information
disclosure. For example, comments, passwords,
fingerprinting, and system information.
bit
This value is 1 if the attack type is infrastructure.
For example, DNS poisoning and route
manipulation.
bit
This value is 1 if the attack type is input
manipulation. For example, XSS, SQL injection,
file retrieval, directory traversal, overflows, and
URL encoding.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Sentinel 6.1 sp2

Table of Contents