nexpose_ticketing 1.0.0 → 1.0.1

Sign up to get free protection for your applications and to get access to all the features.
@@ -6,6 +6,7 @@ require 'csv'
6
6
  require 'nexpose_ticketing/nx_logger'
7
7
  require 'nexpose_ticketing/version'
8
8
  require 'nexpose_ticketing/common_helper'
9
+ require 'securerandom'
9
10
 
10
11
  # Serves as the ServiceNow interface for creating/updating issues from
11
12
  # vulnelrabilities found in Nexpose.
@@ -64,6 +65,56 @@ class ServiceNowHelper
64
65
  end
65
66
  end
66
67
 
68
+ # Retrieves the unique ticket identifier for a particular NXID if one exists.
69
+ #
70
+ # * *Args* :
71
+ # - +nxid+ - NXID of the ticket to be updated.
72
+ #
73
+ def get_ticket_identifier(nxid)
74
+ headers = { 'Content-Type' => 'application/json',
75
+ 'Accept' => 'application/json' }
76
+
77
+ #Get the address
78
+ query = "incident.do?JSONv2&sysparm_query=active=true^u_nxid=#{nxid}"
79
+ uri = URI.join(@servicenow_data[:servicenow_url], '/')
80
+ full_url = URI.join(uri, "/").to_s + query
81
+ req = Net::HTTP::Get.new(full_url, headers)
82
+ req.basic_auth @servicenow_data[:username], @servicenow_data[:password]
83
+ resp = Net::HTTP.new(uri.host, uri.port)
84
+
85
+ # Enable this line for debugging the https call.
86
+ # resp.set_debug_output(@log)
87
+
88
+ if uri.scheme == 'https'
89
+ resp.use_ssl = true
90
+ resp.verify_mode = OpenSSL::SSL::VERIFY_NONE
91
+ end
92
+
93
+ begin
94
+ response = resp.request(req)
95
+ rescue Exception => e
96
+ @log.log_error_message("Request failed for NXID #{nxid}.\n#{e}")
97
+ end
98
+
99
+ tickets = JSON.parse(response.body)
100
+ records = tickets['records']
101
+ if records.count > 1
102
+ @log.log_error_message("Found more than one result for NXID #{nxid}. Updating first result.")
103
+ records.each { |r| @log.log_error_message("NXID #{nxid} found with Rapid7 Identifier #{r['u_rpd_id']}") }
104
+ elsif records.count == 0
105
+ @log.log_error_message("No results found for NXID #{nxid}.")
106
+ return nil
107
+ end
108
+
109
+ ticket_id = records.first['u_rpd_id']
110
+ @log.log_message("Found ticket for NXID #{nxid} ID is: #{ticket_id}")
111
+ if ticket_id.nil?
112
+ @log.log_error_message("ID is nil for ticket with NXID #{nxid}.")
113
+ end
114
+
115
+ ticket_id
116
+ end
117
+
67
118
  # Post an individual JSON-formatted ticket to ServiceNow. If the response from the post is a 301/
68
119
  # 302 redirect, the method will attempt to resend the ticket to the response's location for up to
69
120
  # [limit] times (which starts at the redirect_limit config value and is decremented with each
@@ -142,52 +193,60 @@ class ServiceNowHelper
142
193
  tickets = []
143
194
  previous_row = nil
144
195
  description = nil
145
- action = 'insert'
196
+ action = 'insert'
197
+
146
198
  CSV.parse(vulnerability_list.chomp, headers: :first_row) do |row|
147
199
  if previous_row.nil?
148
200
  previous_row = row.dup
149
201
  nxid = @common_helper.generate_nxid(nexpose_identifier_id, row)
202
+
150
203
  action = unless row['comparison'].nil? || row['comparison'] == 'New'
151
204
  'update'
152
205
  else
153
206
  'insert'
154
207
  end
208
+
155
209
  @ticket = {
156
210
  'sysparm_action' => action,
157
- 'u_caller_id' => "#{@servicenow_data[:username]}",
158
- 'u_category' => 'Software',
159
- 'u_impact' => '1',
160
- 'u_urgency' => '1',
161
- 'u_short_description' => @common_helper.get_title(row),
162
- 'sysparm_query' => "active=true^u_work_notesCONTAINSNXID: #{nxid}",
163
- 'u_work_notes' => ""
211
+ 'caller_id' => "#{@servicenow_data[:username]}",
212
+ 'category' => 'Software',
213
+ 'impact' => '1',
214
+ 'urgency' => '1',
215
+ 'short_description' => @common_helper.get_title(row),
216
+ 'work_notes' => "",
217
+ 'u_nxid' => nxid,
218
+ 'u_rpd_id' => nil
164
219
  }
165
220
  description = @common_helper.get_description(nexpose_identifier_id, row)
166
221
  elsif matching_fields.any? { |x| previous_row[x].nil? || previous_row[x] != row[x] }
167
222
  info = @common_helper.get_field_info(matching_fields, previous_row)
168
223
  @log.log_message("Generated ticket with #{info}")
169
224
 
170
- @ticket['u_work_notes'] = @common_helper.print_description(description)
225
+ @ticket['work_notes'] = @common_helper.print_description(description)
171
226
  tickets.push(@ticket)
227
+
172
228
  previous_row = nil
173
229
  description = nil
174
230
  redo
175
231
  else
176
- if !row['comparison'].nil? && row['comparison'] != 'New'
177
- action = 'update'
178
- end
232
+ @ticket['sysparm_action'] = 'update' unless row['comparison'] == 'New'
179
233
  description = @common_helper.update_description(description, row)
180
234
  end
181
235
  end
182
236
 
183
237
  unless @ticket.nil? || @ticket.empty?
184
- @ticket['u_work_notes'] = @common_helper.print_description(description) unless (@ticket.size == 0)
238
+ @ticket['work_notes'] = @common_helper.print_description(description) unless (@ticket.size == 0)
185
239
  tickets.push(@ticket)
186
240
  end
187
241
  @log.log_message("Generated <#{tickets.count.to_s}> tickets.")
188
242
 
189
243
  tickets.map do |t|
190
- t.delete('sysparm_query') if t['sysparm_action'] == 'insert'
244
+ if t['sysparm_action'] == 'update'
245
+ t['sysparm_action'] = 'insert'
246
+ t['u_rpd_id'] = get_ticket_identifier(t['u_nxid'])
247
+ end
248
+
249
+ t['u_rpd_id'] ||= SecureRandom.uuid
191
250
  t.to_json
192
251
  end
193
252
  end
@@ -233,10 +292,11 @@ class ServiceNowHelper
233
292
  CSV.parse(vulnerability_list.chomp, headers: :first_row) do |row|
234
293
  @nxid = @common_helper.generate_nxid(nexpose_identifier_id, row)
235
294
  # 'state' 7 is the "Closed" state within ServiceNow.
295
+ ticket_id = get_ticket_identifier(@nxid)
236
296
  @log.log_message("Closing ticket with NXID: #{@nxid}.")
237
297
  ticket = {
238
- 'sysparm_action' => 'update',
239
- 'sysparm_query' => "active=true^u_work_notesCONTAINSNXID: #{@nxid}",
298
+ 'sysparm_action' => 'insert',
299
+ 'u_rpd_id' => ticket_id,
240
300
  'state' => '7'
241
301
  }.to_json
242
302
  tickets.push(ticket)
@@ -35,7 +35,7 @@ module NexposeTicketing
35
35
  end
36
36
  end
37
37
 
38
- def setup_logging(enabled, log_level = nil)
38
+ def setup_logging(enabled, log_level = 'info')
39
39
  unless enabled || @log.nil?
40
40
  log_message('Logging disabled.')
41
41
  return
@@ -50,7 +50,7 @@ module NexposeTicketing
50
50
  io.autoclose = false
51
51
  io.sync = true
52
52
  @log = Logger.new(io, 'weekly')
53
- @log.level = if log_level.casecmp('info') == 0
53
+ @log.level = if log_level.to_s.casecmp('info') == 0
54
54
  Logger::INFO
55
55
  else
56
56
  Logger::DEBUG
@@ -146,5 +146,10 @@ module NexposeTicketing
146
146
  end
147
147
  end
148
148
 
149
+ #Used by net library for debugging
150
+ def <<(value)
151
+ log_debug_message(value)
152
+ end
153
+
149
154
  end
150
155
  end
@@ -22,6 +22,8 @@ module NexposeReportHelper
22
22
  report_details = @nsc.last_report(report_id)
23
23
  file = Tempfile.new("#{report_id}")
24
24
  file.write(@nsc.download(report_details.uri))
25
+ file.flush
26
+
25
27
  #Got the report, cleanup server-side
26
28
  @nsc.delete_report_config(report_id)
27
29
  file
@@ -315,57 +315,58 @@ SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
315
315
  end
316
316
 
317
317
 
318
- def ticket_rate_limiter(options, query_results_file, ticket_prepare_method, ticket_send_method)
318
+ def ticket_rate_limiter(options, query_results_file, ticket_prepare_method, ticket_send_method)
319
319
  batch_size_max = (options[:batch_size] + 1)
320
320
  log_message("Batching tickets in sizes: #{options[:batch_size]}")
321
321
 
322
- #Vulnerability mode is batched by vulnerability_id. The rest are batched by ip_address.
323
- if @options[:ticket_mode] == 'V'
324
- batching_field = 'vulnerability_id'
325
- else
326
- batching_field = 'ip_address'
327
- end
328
-
322
+ #Vulnerability mode is batched by vulnerability_id, IP mode is batched by IP address.
323
+ current_id = -1
324
+ id_field = if @options[:ticket_mode] == 'V'
325
+ 'vulnerability_id'
326
+ else
327
+ 'ip_address'
328
+ end
329
+
329
330
  # Start the batching
330
331
  query_results_file.rewind
331
332
  csv_header = query_results_file.readline
332
333
  ticket_batch = []
333
- current_batching_value = -1
334
334
  current_csv_row = nil
335
335
 
336
336
  begin
337
- IO.foreach(query_results_file) do |line|
338
- ticket_batch << line
337
+ CSV.foreach(query_results_file, headers: csv_header) do |row|
338
+ ticket_batch << row
339
339
 
340
- CSV.parse(line.chomp, headers: csv_header) do |row|
341
- if current_batching_value == -1
342
- current_batching_value = row[batching_field.to_s] unless row[batching_field.to_s] == 'current_batching_value'
343
- end
344
- current_csv_row = row unless row[batching_field.to_s] == 'current_batching_value'
345
- end
340
+ #Keep updating the ID until we hit the batch 'limit'
341
+ #Should this be <=??? What happens if value n-1 is different?
346
342
 
347
- if ticket_batch.size >= batch_size_max
348
- #Batch target reached. Make sure we end with a complete IP address set (all tickets for a single IP in this batch)
349
- if(current_batching_value != current_csv_row[batching_field.to_s])
350
- log_message('Batch size reached. Sending tickets.')
351
-
352
- #Move the mismatching line to the next batch
353
- line_holder = ticket_batch.pop
354
- ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
355
- # Cleanup for the next batch
356
- ticket_batch.clear
357
- ticket_batch << csv_header
358
- ticket_batch << line_holder
359
- current_batching_value = -1
360
- end
343
+ if ticket_batch.size < batch_size_max
344
+ current_id = row[id_field]
345
+ next
361
346
  end
347
+
348
+ #Keep adding rows to get all information on an asset/vulnerability
349
+ next if @options[:ticket_mode] != 'D' && row[id_field] == current_id
350
+
351
+ #Last row is mismatch/independent
352
+ leftover_row = ticket_batch.pop
353
+
354
+ log_message('Batch size reached. Sending tickets.')
355
+ ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
356
+
357
+ ticket_batch.clear
358
+ ticket_batch << csv_header
359
+ ticket_batch << leftover_row
360
+ current_id = -1
362
361
  end
363
362
  ensure
364
363
  log_message('Finished reading report. Sending any remaining tickets and cleaning up file system.')
364
+
365
365
  ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
366
+
366
367
  query_results_file.close
367
368
  query_results_file.unlink
368
- end
369
+ end
369
370
  end
370
371
 
371
372
  def ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
@@ -1,3 +1,3 @@
1
1
  module NexposeTicketing
2
- VERSION = "1.0.0"
2
+ VERSION = "1.0.1"
3
3
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: nexpose_ticketing
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0
4
+ version: 1.0.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Damian Finol
@@ -10,94 +10,94 @@ authors:
10
10
  autorequire:
11
11
  bindir: bin
12
12
  cert_chain: []
13
- date: 2015-12-10 00:00:00.000000000 Z
13
+ date: 2016-01-19 00:00:00.000000000 Z
14
14
  dependencies:
15
15
  - !ruby/object:Gem::Dependency
16
16
  name: nexpose
17
17
  requirement: !ruby/object:Gem::Requirement
18
18
  requirements:
19
- - - "~>"
19
+ - - ~>
20
20
  - !ruby/object:Gem::Version
21
21
  version: '2.1'
22
- - - ">="
22
+ - - ! '>='
23
23
  - !ruby/object:Gem::Version
24
24
  version: 2.1.0
25
25
  type: :runtime
26
26
  prerelease: false
27
27
  version_requirements: !ruby/object:Gem::Requirement
28
28
  requirements:
29
- - - "~>"
29
+ - - ~>
30
30
  - !ruby/object:Gem::Version
31
31
  version: '2.1'
32
- - - ">="
32
+ - - ! '>='
33
33
  - !ruby/object:Gem::Version
34
34
  version: 2.1.0
35
35
  - !ruby/object:Gem::Dependency
36
36
  name: savon
37
37
  requirement: !ruby/object:Gem::Requirement
38
38
  requirements:
39
- - - "~>"
39
+ - - ~>
40
40
  - !ruby/object:Gem::Version
41
41
  version: '2.1'
42
42
  type: :runtime
43
43
  prerelease: false
44
44
  version_requirements: !ruby/object:Gem::Requirement
45
45
  requirements:
46
- - - "~>"
46
+ - - ~>
47
47
  - !ruby/object:Gem::Version
48
48
  version: '2.1'
49
49
  - !ruby/object:Gem::Dependency
50
50
  name: nokogiri
51
51
  requirement: !ruby/object:Gem::Requirement
52
52
  requirements:
53
- - - "~>"
53
+ - - ~>
54
54
  - !ruby/object:Gem::Version
55
55
  version: '1.6'
56
56
  type: :runtime
57
57
  prerelease: false
58
58
  version_requirements: !ruby/object:Gem::Requirement
59
59
  requirements:
60
- - - "~>"
60
+ - - ~>
61
61
  - !ruby/object:Gem::Version
62
62
  version: '1.6'
63
63
  - !ruby/object:Gem::Dependency
64
64
  name: rspec
65
65
  requirement: !ruby/object:Gem::Requirement
66
66
  requirements:
67
- - - "~>"
67
+ - - ~>
68
68
  - !ruby/object:Gem::Version
69
69
  version: '3.2'
70
- - - ">="
70
+ - - ! '>='
71
71
  - !ruby/object:Gem::Version
72
72
  version: 3.2.0
73
73
  type: :development
74
74
  prerelease: false
75
75
  version_requirements: !ruby/object:Gem::Requirement
76
76
  requirements:
77
- - - "~>"
77
+ - - ~>
78
78
  - !ruby/object:Gem::Version
79
79
  version: '3.2'
80
- - - ">="
80
+ - - ! '>='
81
81
  - !ruby/object:Gem::Version
82
82
  version: 3.2.0
83
83
  - !ruby/object:Gem::Dependency
84
84
  name: rspec-mocks
85
85
  requirement: !ruby/object:Gem::Requirement
86
86
  requirements:
87
- - - "~>"
87
+ - - ~>
88
88
  - !ruby/object:Gem::Version
89
89
  version: '3.2'
90
- - - ">="
90
+ - - ! '>='
91
91
  - !ruby/object:Gem::Version
92
92
  version: 3.2.0
93
93
  type: :development
94
94
  prerelease: false
95
95
  version_requirements: !ruby/object:Gem::Requirement
96
96
  requirements:
97
- - - "~>"
97
+ - - ~>
98
98
  - !ruby/object:Gem::Version
99
99
  version: '3.2'
100
- - - ">="
100
+ - - ! '>='
101
101
  - !ruby/object:Gem::Version
102
102
  version: 3.2.0
103
103
  description: This gem provides a Ruby implementation of different integrations with
@@ -127,7 +127,7 @@ files:
127
127
  - lib/nexpose_ticketing/config/remedy_wsdl/HPD_IncidentInterface_WS.xml
128
128
  - lib/nexpose_ticketing/config/servicedesk.config
129
129
  - lib/nexpose_ticketing/config/servicenow.config
130
- - lib/nexpose_ticketing/config/servicenow_updateset/Rapid7 Nexpose Ticketing.glide-calgary-02-15-2013__patch2-hotfix5.xml
130
+ - lib/nexpose_ticketing/config/servicenow_updateset/Rapid7_Nexpose_Ticketing_ServiceNow_update_set.xml
131
131
  - lib/nexpose_ticketing/config/ticket_service.config
132
132
  - lib/nexpose_ticketing/helpers/jira_helper.rb
133
133
  - lib/nexpose_ticketing/helpers/remedy_helper.rb
@@ -149,17 +149,17 @@ require_paths:
149
149
  - lib
150
150
  required_ruby_version: !ruby/object:Gem::Requirement
151
151
  requirements:
152
- - - ">="
152
+ - - ! '>='
153
153
  - !ruby/object:Gem::Version
154
154
  version: '1.9'
155
155
  required_rubygems_version: !ruby/object:Gem::Requirement
156
156
  requirements:
157
- - - ">="
157
+ - - ! '>='
158
158
  - !ruby/object:Gem::Version
159
159
  version: '0'
160
160
  requirements: []
161
161
  rubyforge_project:
162
- rubygems_version: 2.4.3
162
+ rubygems_version: 2.2.2
163
163
  signing_key:
164
164
  specification_version: 4
165
165
  summary: Ruby Nexpose Ticketing Engine.
@@ -1,390 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8"?>
2
- <unload unload_date="2014-04-08 18:08:57">
3
- <sys_remote_update_set action="INSERT_OR_UPDATE">
4
- <collisions/>
5
- <commit_date/>
6
- <deleted/>
7
- <description>Rapid7 Nexpose Ticketing Integration.
8
-
9
- Support Email: integrations_support@rapid7.com
10
- Support Phone: (866) 390-8113
11
- </description>
12
- <inserted/>
13
- <name>Rapid7 Nexpose Ticketing</name>
14
- <origin_sys_id/>
15
- <release_date>2014-04-08 18:02:17</release_date>
16
- <remote_sys_id>06382388340c6140df776b3ac83c75d9</remote_sys_id>
17
- <state>loaded</state>
18
- <summary/>
19
- <sys_created_by>admin</sys_created_by>
20
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
21
- <sys_id>1fe9af88340c6140df776b3ac83c7535</sys_id>
22
- <sys_mod_count>0</sys_mod_count>
23
- <sys_updated_by>admin</sys_updated_by>
24
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
25
- <target_release>5c668567404bc1003f8e0fc5040a3290</target_release>
26
- <update_set display_value=""/>
27
- <update_source display_value=""/>
28
- <updated/>
29
- <vendor_key>rpd</vendor_key>
30
- <version>glide-calgary-02-15-2013__patch2-hotfix5</version>
31
- </sys_remote_update_set>
32
- <sys_update_xml action="INSERT_OR_UPDATE">
33
- <action>INSERT_OR_UPDATE</action>
34
- <application display_value=""/>
35
- <category>customer</category>
36
- <comments/>
37
- <name>sys_transform_map_7b19ab88340c6140df776b3ac83c7591</name>
38
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_map"><sys_transform_map action="INSERT_OR_UPDATE"><active>true</active><copy_empty_fields>false</copy_empty_fields><enforce_mandatory_fields>No</enforce_mandatory_fields><name>Vulnerabilities to Tickets</name><order>100</order><run_business_rules>true</run_business_rules><run_script>false</run_script><script><![CDATA[/**
39
- * For variables go to: http://wiki.service-now.com/index.php?title=Import_Sets
40
- **/
41
- ]]]]><![CDATA[></script><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:05:49</sys_created_on><sys_id>7b19ab88340c6140df776b3ac83c7591</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:05:49</sys_updated_on><target_table>incident</target_table></sys_transform_map><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$,/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:05:49</sys_created_on><sys_id>95396748340c6140df776b3ac83c7574</sys_id><sys_mod_count>0</sys_mod_count><sys_name>Vulnerabilities to Tickets</sys_name><sys_parent/><sys_path>!!1$,/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>7b19ab88340c6140df776b3ac83c7591</sys_source_id><sys_source_table>sys_transform_map</sys_source_table><sys_type/><sys_update_name>sys_transform_map_7b19ab88340c6140df776b3ac83c7591</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:05:49</sys_updated_on></sys_app_file></record_update>]]></payload>
42
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
43
- <replace_on_upgrade>false</replace_on_upgrade>
44
- <sys_created_by>admin</sys_created_by>
45
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
46
- <sys_id>13e9af88340c6140df776b3ac83c7539</sys_id>
47
- <sys_mod_count>0</sys_mod_count>
48
- <sys_updated_by>admin</sys_updated_by>
49
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
50
- <table/>
51
- <target_name>Vulnerabilities to Tickets</target_name>
52
- <type>Table Transform Map</type>
53
- <update_domain>global</update_domain>
54
- <update_set display_value=""/>
55
- <view/>
56
- </sys_update_xml>
57
- <sys_update_xml action="INSERT_OR_UPDATE">
58
- <action>INSERT_OR_UPDATE</action>
59
- <application display_value=""/>
60
- <category>customer</category>
61
- <comments/>
62
- <name>sys_transform_entry_7369eb88340c6140df776b3ac83c7537</name>
63
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_caller_id</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7369eb88340c6140df776b3ac83c7537</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>caller_id</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$3/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>bb69eb88340c6140df776b3ac83c7537</sys_id><sys_mod_count>0</sys_mod_count><sys_name>7369eb88340c6140df776b3ac83c7537</sys_name><sys_parent/><sys_path>!!1$3/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>7369eb88340c6140df776b3ac83c7537</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_7369eb88340c6140df776b3ac83c7537</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
64
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
65
- <replace_on_upgrade>false</replace_on_upgrade>
66
- <sys_created_by>admin</sys_created_by>
67
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
68
- <sys_id>17e9af88340c6140df776b3ac83c7538</sys_id>
69
- <sys_mod_count>0</sys_mod_count>
70
- <sys_updated_by>admin</sys_updated_by>
71
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
72
- <table/>
73
- <target_name>7369eb88340c6140df776b3ac83c7537</target_name>
74
- <type>Field Map</type>
75
- <update_domain>global</update_domain>
76
- <update_set display_value=""/>
77
- <view/>
78
- </sys_update_xml>
79
- <sys_update_xml action="INSERT_OR_UPDATE">
80
- <action>INSERT</action>
81
- <application display_value=""/>
82
- <category>customer</category>
83
- <comments/>
84
- <name>sys_dictionary_u_rpd_vulnerabilities_u_urgency</name>
85
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_urgency" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>urgency</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_urgency</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="Integer">integer</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:57</sys_created_on><sys_id>a33d099634735140df776b3ac83c759d</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#N/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:33</sys_created_on><sys_id>175d499634735140df776b3ac83c752f</sys_id><sys_mod_count>0</sys_mod_count><sys_name>urgency</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#N/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_urgency" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">a33d099634735140df776b3ac83c759d</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_urgency</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on></sys_app_file></record_update>]]></payload>
86
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
87
- <replace_on_upgrade>false</replace_on_upgrade>
88
- <sys_created_by>admin</sys_created_by>
89
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
90
- <sys_id>1be9af88340c6140df776b3ac83c7537</sys_id>
91
- <sys_mod_count>0</sys_mod_count>
92
- <sys_updated_by>admin</sys_updated_by>
93
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
94
- <table>u_rpd_vulnerabilities</table>
95
- <target_name>Vulnerabilities.u_urgency</target_name>
96
- <type>Dictionary</type>
97
- <update_domain>global</update_domain>
98
- <update_set display_value=""/>
99
- <view/>
100
- </sys_update_xml>
101
- <sys_update_xml action="INSERT_OR_UPDATE">
102
- <action>INSERT</action>
103
- <application display_value=""/>
104
- <category>customer</category>
105
- <comments/>
106
- <name>sys_dictionary_u_rpd_vulnerabilities_u_caller_id</name>
107
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_caller_id" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>caller_id</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_caller_id</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:59</sys_created_on><sys_id>d72d099634735140df776b3ac83c7592</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:59</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#F/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:32</sys_created_on><sys_id>0f5d499634735140df776b3ac83c7502</sys_id><sys_mod_count>0</sys_mod_count><sys_name>caller_id</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#F/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_caller_id" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">d72d099634735140df776b3ac83c7592</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_caller_id</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:59</sys_updated_on></sys_app_file></record_update>]]></payload>
108
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
109
- <replace_on_upgrade>false</replace_on_upgrade>
110
- <sys_created_by>admin</sys_created_by>
111
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
112
- <sys_id>1fe9af88340c6140df776b3ac83c7536</sys_id>
113
- <sys_mod_count>0</sys_mod_count>
114
- <sys_updated_by>admin</sys_updated_by>
115
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
116
- <table>u_rpd_vulnerabilities</table>
117
- <target_name>Vulnerabilities.u_caller_id</target_name>
118
- <type>Dictionary</type>
119
- <update_domain>global</update_domain>
120
- <update_set display_value=""/>
121
- <view/>
122
- </sys_update_xml>
123
- <sys_update_xml action="INSERT_OR_UPDATE">
124
- <action>INSERT_OR_UPDATE</action>
125
- <application display_value=""/>
126
- <category>customer</category>
127
- <comments/>
128
- <name>sys_transform_entry_3f69a788340c6140df776b3ac83c752f</name>
129
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_urgency</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>3f69a788340c6140df776b3ac83c752f</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>urgency</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$./</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7769a788340c6140df776b3ac83c7530</sys_id><sys_mod_count>0</sys_mod_count><sys_name>3f69a788340c6140df776b3ac83c752f</sys_name><sys_parent/><sys_path>!!1$./</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>3f69a788340c6140df776b3ac83c752f</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_3f69a788340c6140df776b3ac83c752f</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
130
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
131
- <replace_on_upgrade>false</replace_on_upgrade>
132
- <sys_created_by>admin</sys_created_by>
133
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
134
- <sys_id>53e9af88340c6140df776b3ac83c7538</sys_id>
135
- <sys_mod_count>0</sys_mod_count>
136
- <sys_updated_by>admin</sys_updated_by>
137
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
138
- <table/>
139
- <target_name>3f69a788340c6140df776b3ac83c752f</target_name>
140
- <type>Field Map</type>
141
- <update_domain>global</update_domain>
142
- <update_set display_value=""/>
143
- <view/>
144
- </sys_update_xml>
145
- <sys_update_xml action="INSERT_OR_UPDATE">
146
- <action>INSERT</action>
147
- <application display_value=""/>
148
- <category>customer</category>
149
- <comments/>
150
- <name>sys_dictionary_u_rpd_vulnerabilities_u_short_description</name>
151
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_short_description" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>short_description</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_short_description</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:57</sys_created_on><sys_id>6e3d099634735140df776b3ac83c759a</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#L/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:33</sys_created_on><sys_id>575d499634735140df776b3ac83c7524</sys_id><sys_mod_count>0</sys_mod_count><sys_name>short_description</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#L/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_short_description" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">6e3d099634735140df776b3ac83c759a</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_short_description</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on></sys_app_file></record_update>]]></payload>
152
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
153
- <replace_on_upgrade>false</replace_on_upgrade>
154
- <sys_created_by>admin</sys_created_by>
155
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
156
- <sys_id>57e9af88340c6140df776b3ac83c7537</sys_id>
157
- <sys_mod_count>0</sys_mod_count>
158
- <sys_updated_by>admin</sys_updated_by>
159
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
160
- <table>u_rpd_vulnerabilities</table>
161
- <target_name>Vulnerabilities.u_short_description</target_name>
162
- <type>Dictionary</type>
163
- <update_domain>global</update_domain>
164
- <update_set display_value=""/>
165
- <view/>
166
- </sys_update_xml>
167
- <sys_update_xml action="INSERT_OR_UPDATE">
168
- <action>INSERT_OR_UPDATE</action>
169
- <application display_value=""/>
170
- <category>customer</category>
171
- <comments/>
172
- <name>sys_app_module_eea92f88340c6140df776b3ac83c75ff</name>
173
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update sys_domain="global" table="sys_app_module"><sys_app_module action="INSERT_OR_UPDATE"><active>true</active><application display_value="Rapid7 Nexpose Support">6f89eb88340c6140df776b3ac83c75e5</application><content_page/><filter/><hint>Nexpose Support</hint><homepage/><image/><link_type>DIRECT</link_type><map_page/><name/><order/><query>http://www.rapid7.com/support/</query><report/><roles>admin</roles><survey/><survey_overwrite>true</survey_overwrite><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:08:18</sys_created_on><sys_domain>global</sys_domain><sys_id>eea92f88340c6140df776b3ac83c75ff</sys_id><sys_mod_count>0</sys_mod_count><sys_overrides/><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:08:18</sys_updated_on><timeline_page/><title>Nexpose Support</title><uncancelable>false</uncancelable><view_name/><window_name/></sys_app_module><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$5/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:08:18</sys_created_on><sys_id>f5c9eb48340c6140df776b3ac83c75e4</sys_id><sys_mod_count>0</sys_mod_count><sys_name>Nexpose Support</sys_name><sys_parent/><sys_path>!!1$5/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>eea92f88340c6140df776b3ac83c75ff</sys_source_id><sys_source_table>sys_app_module</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_app_module_eea92f88340c6140df776b3ac83c75ff</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:08:18</sys_updated_on></sys_app_file></record_update>]]></payload>
174
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
175
- <replace_on_upgrade>false</replace_on_upgrade>
176
- <sys_created_by>admin</sys_created_by>
177
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
178
- <sys_id>5be9af88340c6140df776b3ac83c7536</sys_id>
179
- <sys_mod_count>0</sys_mod_count>
180
- <sys_updated_by>admin</sys_updated_by>
181
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
182
- <table/>
183
- <target_name>Nexpose Support</target_name>
184
- <type>Module</type>
185
- <update_domain>global</update_domain>
186
- <update_set display_value=""/>
187
- <view/>
188
- </sys_update_xml>
189
- <sys_update_xml action="INSERT_OR_UPDATE">
190
- <action>INSERT_OR_UPDATE</action>
191
- <application display_value=""/>
192
- <category>customer</category>
193
- <comments/>
194
- <name>sys_transform_entry_ff69eb88340c6140df776b3ac83c7533</name>
195
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_impact</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>ff69eb88340c6140df776b3ac83c7533</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>impact</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$1/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>3b69eb88340c6140df776b3ac83c7534</sys_id><sys_mod_count>0</sys_mod_count><sys_name>ff69eb88340c6140df776b3ac83c7533</sys_name><sys_parent/><sys_path>!!1$1/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>ff69eb88340c6140df776b3ac83c7533</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_ff69eb88340c6140df776b3ac83c7533</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
196
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
197
- <replace_on_upgrade>false</replace_on_upgrade>
198
- <sys_created_by>admin</sys_created_by>
199
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
200
- <sys_id>5fe9af88340c6140df776b3ac83c7538</sys_id>
201
- <sys_mod_count>0</sys_mod_count>
202
- <sys_updated_by>admin</sys_updated_by>
203
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
204
- <table/>
205
- <target_name>ff69eb88340c6140df776b3ac83c7533</target_name>
206
- <type>Field Map</type>
207
- <update_domain>global</update_domain>
208
- <update_set display_value=""/>
209
- <view/>
210
- </sys_update_xml>
211
- <sys_update_xml action="INSERT_OR_UPDATE">
212
- <action>INSERT</action>
213
- <application display_value=""/>
214
- <category>customer</category>
215
- <comments/>
216
- <name>sys_dictionary_u_rpd_vulnerabilities_u_impact</name>
217
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_impact" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>impact</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_impact</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="Integer">integer</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:58</sys_created_on><sys_id>0a3d099634735140df776b3ac83c7598</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#J/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:33</sys_created_on><sys_id>475d499634735140df776b3ac83c7519</sys_id><sys_mod_count>0</sys_mod_count><sys_name>impact</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#J/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_impact" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">0a3d099634735140df776b3ac83c7598</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_impact</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on></sys_app_file></record_update>]]></payload>
218
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
219
- <replace_on_upgrade>false</replace_on_upgrade>
220
- <sys_created_by>admin</sys_created_by>
221
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
222
- <sys_id>93e9af88340c6140df776b3ac83c7537</sys_id>
223
- <sys_mod_count>0</sys_mod_count>
224
- <sys_updated_by>admin</sys_updated_by>
225
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
226
- <table>u_rpd_vulnerabilities</table>
227
- <target_name>Vulnerabilities.u_impact</target_name>
228
- <type>Dictionary</type>
229
- <update_domain>global</update_domain>
230
- <update_set display_value=""/>
231
- <view/>
232
- </sys_update_xml>
233
- <sys_update_xml action="INSERT_OR_UPDATE">
234
- <action>INSERT_OR_UPDATE</action>
235
- <application display_value=""/>
236
- <category>customer</category>
237
- <comments/>
238
- <name>sys_app_application_6f89eb88340c6140df776b3ac83c75e5</name>
239
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update sys_domain="global" table="sys_app_application"><sys_app_application action="INSERT_OR_UPDATE"><active>true</active><category display_value="Custom Applications">e0355b31ef303000a61d5a3615c0fb78</category><description>Rapid7 Nexpose Ticketing Integration.&#13;
240
- &#13;
241
- Support Email: integrations_support@rapid7.com&#13;
242
- Support Phone: (866) 390-8113</description><device_type>browser</device_type><hint>Rapid7 Nexpose Support</hint><name>rapid7_nexpose_support</name><order>100</order><roles>admin</roles><sys_app_file/><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:07:38</sys_created_on><sys_domain>global</sys_domain><sys_id>6f89eb88340c6140df776b3ac83c75e5</sys_id><sys_mod_count>0</sys_mod_count><sys_overrides/><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:07:38</sys_updated_on><title>Rapid7 Nexpose Support</title><view_name/></sys_app_application><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$4/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:07:38</sys_created_on><sys_id>f399eb88340c6140df776b3ac83c75ed</sys_id><sys_mod_count>0</sys_mod_count><sys_name>Rapid7 Nexpose Support</sys_name><sys_parent/><sys_path>!!1$4/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>6f89eb88340c6140df776b3ac83c75e5</sys_source_id><sys_source_table>sys_app_application</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_app_application_6f89eb88340c6140df776b3ac83c75e5</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:07:38</sys_updated_on></sys_app_file></record_update>]]></payload>
243
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
244
- <replace_on_upgrade>false</replace_on_upgrade>
245
- <sys_created_by>admin</sys_created_by>
246
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
247
- <sys_id>97e9af88340c6140df776b3ac83c7536</sys_id>
248
- <sys_mod_count>0</sys_mod_count>
249
- <sys_updated_by>admin</sys_updated_by>
250
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
251
- <table/>
252
- <target_name>Rapid7 Nexpose Support</target_name>
253
- <type>Application Menu</type>
254
- <update_domain>global</update_domain>
255
- <update_set display_value=""/>
256
- <view/>
257
- </sys_update_xml>
258
- <sys_update_xml action="INSERT_OR_UPDATE">
259
- <action>INSERT_OR_UPDATE</action>
260
- <application display_value=""/>
261
- <category>customer</category>
262
- <comments/>
263
- <name>sys_transform_entry_af69a788340c6140df776b3ac83c752d</name>
264
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_work_notes</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>af69a788340c6140df776b3ac83c752d</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>work_notes</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$-/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>6b69a788340c6140df776b3ac83c752e</sys_id><sys_mod_count>0</sys_mod_count><sys_name>af69a788340c6140df776b3ac83c752d</sys_name><sys_parent/><sys_path>!!1$-/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>af69a788340c6140df776b3ac83c752d</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_af69a788340c6140df776b3ac83c752d</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
265
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
266
- <replace_on_upgrade>false</replace_on_upgrade>
267
- <sys_created_by>admin</sys_created_by>
268
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
269
- <sys_id>9be9af88340c6140df776b3ac83c7538</sys_id>
270
- <sys_mod_count>0</sys_mod_count>
271
- <sys_updated_by>admin</sys_updated_by>
272
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
273
- <table/>
274
- <target_name>af69a788340c6140df776b3ac83c752d</target_name>
275
- <type>Field Map</type>
276
- <update_domain>global</update_domain>
277
- <update_set display_value=""/>
278
- <view/>
279
- </sys_update_xml>
280
- <sys_update_xml action="INSERT_OR_UPDATE">
281
- <action>INSERT_OR_UPDATE</action>
282
- <application display_value=""/>
283
- <category>customer</category>
284
- <comments/>
285
- <name>sys_transform_entry_3b69eb88340c6140df776b3ac83c7535</name>
286
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_category</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>3b69eb88340c6140df776b3ac83c7535</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>category</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$2/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7369eb88340c6140df776b3ac83c7536</sys_id><sys_mod_count>0</sys_mod_count><sys_name>3b69eb88340c6140df776b3ac83c7535</sys_name><sys_parent/><sys_path>!!1$2/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>3b69eb88340c6140df776b3ac83c7535</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_3b69eb88340c6140df776b3ac83c7535</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
287
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
288
- <replace_on_upgrade>false</replace_on_upgrade>
289
- <sys_created_by>admin</sys_created_by>
290
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
291
- <sys_id>9fe9af88340c6140df776b3ac83c7537</sys_id>
292
- <sys_mod_count>0</sys_mod_count>
293
- <sys_updated_by>admin</sys_updated_by>
294
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
295
- <table/>
296
- <target_name>3b69eb88340c6140df776b3ac83c7535</target_name>
297
- <type>Field Map</type>
298
- <update_domain>global</update_domain>
299
- <update_set display_value=""/>
300
- <view/>
301
- </sys_update_xml>
302
- <sys_update_xml action="INSERT_OR_UPDATE">
303
- <action>INSERT</action>
304
- <application display_value=""/>
305
- <category>customer</category>
306
- <comments/>
307
- <name>dictionary_u_rpd_vulnerabilities_55952fb42c46425d84de8f4fda4ce339</name>
308
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><database><element extends="sys_import_set_row" label="Vulnerabilities" name="u_rpd_vulnerabilities" type="collection"><element label="work_notes" max_length="50000" name="u_work_notes" type="string"/><element label="urgency" max_length="40" name="u_urgency" type="integer"/><element label="short_description" max_length="40" name="u_short_description" type="string"/><element label="category" max_length="40" name="u_category" type="string"/><element label="impact" max_length="40" name="u_impact" type="integer"/><element label="caller_id" max_length="40" name="u_caller_id" type="string"/></element></database><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#D/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:14:25</sys_created_on><sys_id>221dc59634735140df776b3ac83c75c2</sys_id><sys_mod_count>0</sys_mod_count><sys_name>u_rpd_vulnerabilities</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#D/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="NULL" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">ee1dc59634735140df776b3ac83c75c0</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>dictionary_u_rpd_vulnerabilities_55952fb42c46425d84de8f4fda4ce339</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:59</sys_updated_on></sys_app_file></record_update>]]></payload>
309
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
310
- <replace_on_upgrade>false</replace_on_upgrade>
311
- <sys_created_by>admin</sys_created_by>
312
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
313
- <sys_id>d3e9af88340c6140df776b3ac83c7536</sys_id>
314
- <sys_mod_count>0</sys_mod_count>
315
- <sys_updated_by>admin</sys_updated_by>
316
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
317
- <table>u_rpd_vulnerabilities</table>
318
- <target_name>Vulnerabilities</target_name>
319
- <type>Database field(s)</type>
320
- <update_domain>global</update_domain>
321
- <update_set display_value=""/>
322
- <view/>
323
- </sys_update_xml>
324
- <sys_update_xml action="INSERT_OR_UPDATE">
325
- <action>INSERT_OR_UPDATE</action>
326
- <application display_value=""/>
327
- <category>customer</category>
328
- <comments/>
329
- <name>sys_transform_entry_7769a788340c6140df776b3ac83c7531</name>
330
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_short_description</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7769a788340c6140df776b3ac83c7531</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>short_description</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$0/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>bf69a788340c6140df776b3ac83c7531</sys_id><sys_mod_count>0</sys_mod_count><sys_name>7769a788340c6140df776b3ac83c7531</sys_name><sys_parent/><sys_path>!!1$0/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>7769a788340c6140df776b3ac83c7531</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_7769a788340c6140df776b3ac83c7531</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
331
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
332
- <replace_on_upgrade>false</replace_on_upgrade>
333
- <sys_created_by>admin</sys_created_by>
334
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
335
- <sys_id>d7e9af88340c6140df776b3ac83c7538</sys_id>
336
- <sys_mod_count>0</sys_mod_count>
337
- <sys_updated_by>admin</sys_updated_by>
338
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
339
- <table/>
340
- <target_name>7769a788340c6140df776b3ac83c7531</target_name>
341
- <type>Field Map</type>
342
- <update_domain>global</update_domain>
343
- <update_set display_value=""/>
344
- <view/>
345
- </sys_update_xml>
346
- <sys_update_xml action="INSERT_OR_UPDATE">
347
- <action>INSERT</action>
348
- <application display_value=""/>
349
- <category>customer</category>
350
- <comments/>
351
- <name>sys_dictionary_u_rpd_vulnerabilities_u_work_notes</name>
352
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_work_notes" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>work_notes</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_work_notes</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:57</sys_created_on><sys_id>d04d099634735140df776b3ac83c75d1</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#P/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:34</sys_created_on><sys_id>d35d499634735140df776b3ac83c753a</sys_id><sys_mod_count>0</sys_mod_count><sys_name>work_notes</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#P/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_work_notes" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">d04d099634735140df776b3ac83c75d1</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_work_notes</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on></sys_app_file></record_update>]]></payload>
353
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
354
- <replace_on_upgrade>false</replace_on_upgrade>
355
- <sys_created_by>admin</sys_created_by>
356
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
357
- <sys_id>dbe9af88340c6140df776b3ac83c7537</sys_id>
358
- <sys_mod_count>0</sys_mod_count>
359
- <sys_updated_by>admin</sys_updated_by>
360
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
361
- <table>u_rpd_vulnerabilities</table>
362
- <target_name>Vulnerabilities.u_work_notes</target_name>
363
- <type>Dictionary</type>
364
- <update_domain>global</update_domain>
365
- <update_set display_value=""/>
366
- <view/>
367
- </sys_update_xml>
368
- <sys_update_xml action="INSERT_OR_UPDATE">
369
- <action>INSERT</action>
370
- <application display_value=""/>
371
- <category>customer</category>
372
- <comments/>
373
- <name>sys_dictionary_u_rpd_vulnerabilities_u_category</name>
374
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_category" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>category</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_category</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:58</sys_created_on><sys_id>853d099634735140df776b3ac83c7595</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#H/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:32</sys_created_on><sys_id>875d499634735140df776b3ac83c750e</sys_id><sys_mod_count>0</sys_mod_count><sys_name>category</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#H/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_category" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">853d099634735140df776b3ac83c7595</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_category</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on></sys_app_file></record_update>]]></payload>
375
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
376
- <replace_on_upgrade>false</replace_on_upgrade>
377
- <sys_created_by>admin</sys_created_by>
378
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
379
- <sys_id>dfe9af88340c6140df776b3ac83c7536</sys_id>
380
- <sys_mod_count>0</sys_mod_count>
381
- <sys_updated_by>admin</sys_updated_by>
382
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
383
- <table>u_rpd_vulnerabilities</table>
384
- <target_name>Vulnerabilities.u_category</target_name>
385
- <type>Dictionary</type>
386
- <update_domain>global</update_domain>
387
- <update_set display_value=""/>
388
- <view/>
389
- </sys_update_xml>
390
- </unload>