|
| 1 | +<?xml version="1.0" encoding="utf-8"?> |
| 2 | +<!DOCTYPE main SYSTEM "https://outscan.outpost24.com/dtd/XMLReport.dtd"> |
| 3 | +<main> |
| 4 | + <report>OUTSCAN Security Report</report> |
| 5 | + <reportinfo> |
| 6 | + <type>Vulnerability</type> |
| 7 | + <id>1234567891234567891234567890ab</id> |
| 8 | + <reportdate>2019-10-04 19:00</reportdate> |
| 9 | + <timezone>GMT+0:00</timezone> |
| 10 | + <creator>Matt Sicker</creator> |
| 11 | + <date>2019-10-01 19:01 - 2019-10-01 19:01</date> |
| 12 | + <test>1</test> |
| 13 | + <threat>0</threat> |
| 14 | + </reportinfo> |
| 15 | + <hostlist> |
| 16 | + <host> |
| 17 | + <ip>localhost</ip> |
| 18 | + <name/> |
| 19 | + <platform/> |
| 20 | + <high>0</high> |
| 21 | + <medium>1</medium> |
| 22 | + <low>0</low> |
| 23 | + <info>0</info> |
| 24 | + <port>1</port> |
| 25 | + <start>2019-10-01 19:01</start> |
| 26 | + <end>2019-10-01 19:11</end> |
| 27 | + <updated>2019-10-03 23:35</updated> |
| 28 | + <template>Normal with webapp</template> |
| 29 | + <completescan>true</completescan> |
| 30 | + </host> |
| 31 | + </hostlist> |
| 32 | + <portlist> |
| 33 | + <portlist-host> |
| 34 | + <ip>localhost</ip> |
| 35 | + <name/> |
| 36 | + <date>2019-10-01 19:01</date> |
| 37 | + <portinfo> |
| 38 | + <portnumber>443</portnumber> |
| 39 | + <protocol>TCP</protocol> |
| 40 | + <service>http</service> |
| 41 | + <history> |
| 42 | + <firstseen>2019-09-10 19:01</firstseen> |
| 43 | + </history> |
| 44 | + </portinfo> |
| 45 | + </portlist-host> |
| 46 | + </portlist> |
| 47 | + <detaillist> |
| 48 | + <detail> |
| 49 | + <ip>localhost</ip> |
| 50 | + <hostname/> |
| 51 | + <platform/> |
| 52 | + <date>2019-10-01 19:01</date> |
| 53 | + <virtualhost>127.0.0.1</virtualhost> |
| 54 | + <targetopco>PT</targetopco> |
| 55 | + <id>1377090</id> |
| 56 | + <name>Fake vulnerability in fake product</name> |
| 57 | + <portinfo> |
| 58 | + <portnumber>443</portnumber> |
| 59 | + <protocol>TCP</protocol> |
| 60 | + <service>http</service> |
| 61 | + </portinfo> |
| 62 | + <cvss_score>5.1</cvss_score> |
| 63 | + <cvss_vector>(AV:N/AC:H/Au:N/C:P/I:P/A:P) (cdp:ND/td:ND/cr:ND/ir:ND/ar:ND)</cvss_vector> |
| 64 | + <cvss_vector_description>This vulnerability can be exploited with advanced skills and network access to the |
| 65 | + system by an attacker who does not have access to credentials with some impact on confidentiality, some |
| 66 | + impact to the integrity of information and some impact on system or information availability. There are |
| 67 | + currently no exploits in the public domain. However, attacks may be well described or privately held. |
| 68 | + </cvss_vector_description> |
| 69 | + <cvss_v3_score>7.5</cvss_v3_score> |
| 70 | + <cvss_v3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</cvss_v3_vector> |
| 71 | + <risk>2</risk> |
| 72 | + <family>example</family> |
| 73 | + <product>Fake Product</product> |
| 74 | + <description>CSRF tokens are useful. This application did not think that was the case. Now they do.</description> |
| 75 | + <information>This vulnerability was identified because (1) the detected version of Fake Product, |
| 76 | + 1.1.0, is less than 1.1.1 |
| 77 | + Paths: |
| 78 | + / |
| 79 | + </information> |
| 80 | + <falsepositive>0</falsepositive> |
| 81 | + <solutiontitle>Upgrade to the latest version of Fake Product</solutiontitle> |
| 82 | + <solution>Upgrade to the latest version of Fake Product.</solution> |
| 83 | + <category>Update</category> |
| 84 | + <referencelist> |
| 85 | + <reference> |
| 86 | + <type>url</type> |
| 87 | + <url>https://www.example.com/products/fake</url> |
| 88 | + </reference> |
| 89 | + <reference> |
| 90 | + <type>advisory</type> |
| 91 | + <url>https://www.example.com/security/advisories/2019-09-09/</url> |
| 92 | + </reference> |
| 93 | + </referencelist> |
| 94 | + <cve> |
| 95 | + <id>CVE-2019-9315</id> |
| 96 | + </cve> |
| 97 | + <bug> |
| 98 | + <id>109373</id> |
| 99 | + </bug> |
| 100 | + <verify/> |
| 101 | + <history> |
| 102 | + <firstseen>2019-09-10 19:01</firstseen> |
| 103 | + <lastseen>2019-10-01 19:01</lastseen> |
| 104 | + </history> |
| 105 | + </detail> |
| 106 | + </detaillist> |
| 107 | +</main> |
0 commit comments