vuln.nist
Introduction
The tags beginning with vuln.nist
identify events generated by Nist as part of the National Vulnerability Database.
Valid tags and data tablesÂ
The full tag must have two levels. The first two are fixed as vuln.nist
. The third level identifies the type of events sent. The fourth level indicates the event subtype.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|---|---|
Nist |
|
|
For more information, read more About Devo tags.
Table structure
These are the fields displayed in this table:
Field name | Type | Extra fields | Field transformation | Source field name |
---|---|---|---|---|
eventdate |
| Â | Â | Â |
host |
| Â | split(hostchain, "=", 0) | hostchain |
cve |
| Â | Â | Â |
cpe |
| Â | Â | Â |
cvss |
| Â | Â | Â |
access_complexity |
| Â | Â | Â |
access_vector |
| Â | Â | Â |
access_authentication |
| Â | Â | Â |
impact_integrity |
| Â | Â | Â |
impact_confidentiality |
| Â | Â | Â |
impact_availability |
| Â | Â | Â |
cwe |
| Â | Â | Â |
description |
| Â | Â | Â |
message |
| Â | Â | rawMessage |
hostchain |
| ✓ |  |  |
tag |
| ✓ |  |  |
rawMessage |
| ✓ |  |  |
Â