Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Betriebsanweisung Seite 39

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 79
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 38
Name
Description
Bugtraq ID
Filter the results of discovered vulnerabilities based on their Bugtraq identification.
CPE
Filter the results of discovered vulnerabilities based on their CPE identifier.
CVE
Filter the results of discovered vulnerabilities based on their CVE identifier.
CVSS Base Score
Filter the results of discovered vulnerabilities based on the base CVSS score as
reported by the vulnerability plugins.
CVSS Temporal Score
Filter the results of discovered vulnerabilities based on the temporal CVSS score as
reported by the vulnerability plugins.
CVSS Temporal Vector
Filter the results of discovered vulnerabilities based on the CVSS temporal vector as
reported by the vulnerability plugins.
CVSS Vector
Filter the results of the discovered vulnerabilities based on the CVSS vector.
Host
Filter the results of the discovered vulnerabilities based on the discovered IP address
of the device.
IAVA ID
Filter the results of the discovered vulnerabilities based on the IAVA ID of the
vulnerability.
IAVB ID
Filter the results of the discovered vulnerabilities based on the IAVB ID of the
vulnerability.
IAVT ID
Filter the results of the discovered vulnerabilities based on the IAVT ID of the
vulnerability.
OSVDB ID
Filter the results of the discovered vulnerabilities based on the discovered OSVDB
identifier.
Plugin Description
Filter the results of the discovered vulnerabilities based on text available in the
description of the vulnerabilities.
Plugin Family
Filter the results of the discovered vulnerabilities based on the family of vulnerabilities
discovered.
Plugin ID
Filter the results of the discovered vulnerabilities based on the plugin ID that identified
the vulnerability.
Plugin Name
Filter the results of the discovered vulnerabilities based on text contained in the name
of the plugin that discovered the vulnerability.
Plugin Output
Filter the results of the discovered vulnerabilities based on text contained in the output
of the plugin that discovered the vulnerability.
Port
Filter the results of the discovered vulnerabilities based on the port the vulnerability
was discovered on.
Protocol
Filter the results of the discovered vulnerabilities based on the detected protocol: tcp,
udp, or icmp.
Risk Factor
Filter the results of the discovered vulnerabilities based on the identified risk factor.
Seitenansicht 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 78 79

Kommentare zu diesen Handbüchern

Keine Kommentare