nexpose_ticketing 1.0.0 → 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,6 +6,7 @@ require 'csv'
6
6
  require 'nexpose_ticketing/nx_logger'
7
7
  require 'nexpose_ticketing/version'
8
8
  require 'nexpose_ticketing/common_helper'
9
+ require 'securerandom'
9
10
 
10
11
  # Serves as the ServiceNow interface for creating/updating issues from
11
12
  # vulnelrabilities found in Nexpose.
@@ -64,6 +65,56 @@ class ServiceNowHelper
64
65
  end
65
66
  end
66
67
 
68
+ # Retrieves the unique ticket identifier for a particular NXID if one exists.
69
+ #
70
+ # * *Args* :
71
+ # - +nxid+ - NXID of the ticket to be updated.
72
+ #
73
+ def get_ticket_identifier(nxid)
74
+ headers = { 'Content-Type' => 'application/json',
75
+ 'Accept' => 'application/json' }
76
+
77
+ #Get the address
78
+ query = "incident.do?JSONv2&sysparm_query=active=true^u_nxid=#{nxid}"
79
+ uri = URI.join(@servicenow_data[:servicenow_url], '/')
80
+ full_url = URI.join(uri, "/").to_s + query
81
+ req = Net::HTTP::Get.new(full_url, headers)
82
+ req.basic_auth @servicenow_data[:username], @servicenow_data[:password]
83
+ resp = Net::HTTP.new(uri.host, uri.port)
84
+
85
+ # Enable this line for debugging the https call.
86
+ # resp.set_debug_output(@log)
87
+
88
+ if uri.scheme == 'https'
89
+ resp.use_ssl = true
90
+ resp.verify_mode = OpenSSL::SSL::VERIFY_NONE
91
+ end
92
+
93
+ begin
94
+ response = resp.request(req)
95
+ rescue Exception => e
96
+ @log.log_error_message("Request failed for NXID #{nxid}.\n#{e}")
97
+ end
98
+
99
+ tickets = JSON.parse(response.body)
100
+ records = tickets['records']
101
+ if records.count > 1
102
+ @log.log_error_message("Found more than one result for NXID #{nxid}. Updating first result.")
103
+ records.each { |r| @log.log_error_message("NXID #{nxid} found with Rapid7 Identifier #{r['u_rpd_id']}") }
104
+ elsif records.count == 0
105
+ @log.log_error_message("No results found for NXID #{nxid}.")
106
+ return nil
107
+ end
108
+
109
+ ticket_id = records.first['u_rpd_id']
110
+ @log.log_message("Found ticket for NXID #{nxid} ID is: #{ticket_id}")
111
+ if ticket_id.nil?
112
+ @log.log_error_message("ID is nil for ticket with NXID #{nxid}.")
113
+ end
114
+
115
+ ticket_id
116
+ end
117
+
67
118
  # Post an individual JSON-formatted ticket to ServiceNow. If the response from the post is a 301/
68
119
  # 302 redirect, the method will attempt to resend the ticket to the response's location for up to
69
120
  # [limit] times (which starts at the redirect_limit config value and is decremented with each
@@ -142,52 +193,60 @@ class ServiceNowHelper
142
193
  tickets = []
143
194
  previous_row = nil
144
195
  description = nil
145
- action = 'insert'
196
+ action = 'insert'
197
+
146
198
  CSV.parse(vulnerability_list.chomp, headers: :first_row) do |row|
147
199
  if previous_row.nil?
148
200
  previous_row = row.dup
149
201
  nxid = @common_helper.generate_nxid(nexpose_identifier_id, row)
202
+
150
203
  action = unless row['comparison'].nil? || row['comparison'] == 'New'
151
204
  'update'
152
205
  else
153
206
  'insert'
154
207
  end
208
+
155
209
  @ticket = {
156
210
  'sysparm_action' => action,
157
- 'u_caller_id' => "#{@servicenow_data[:username]}",
158
- 'u_category' => 'Software',
159
- 'u_impact' => '1',
160
- 'u_urgency' => '1',
161
- 'u_short_description' => @common_helper.get_title(row),
162
- 'sysparm_query' => "active=true^u_work_notesCONTAINSNXID: #{nxid}",
163
- 'u_work_notes' => ""
211
+ 'caller_id' => "#{@servicenow_data[:username]}",
212
+ 'category' => 'Software',
213
+ 'impact' => '1',
214
+ 'urgency' => '1',
215
+ 'short_description' => @common_helper.get_title(row),
216
+ 'work_notes' => "",
217
+ 'u_nxid' => nxid,
218
+ 'u_rpd_id' => nil
164
219
  }
165
220
  description = @common_helper.get_description(nexpose_identifier_id, row)
166
221
  elsif matching_fields.any? { |x| previous_row[x].nil? || previous_row[x] != row[x] }
167
222
  info = @common_helper.get_field_info(matching_fields, previous_row)
168
223
  @log.log_message("Generated ticket with #{info}")
169
224
 
170
- @ticket['u_work_notes'] = @common_helper.print_description(description)
225
+ @ticket['work_notes'] = @common_helper.print_description(description)
171
226
  tickets.push(@ticket)
227
+
172
228
  previous_row = nil
173
229
  description = nil
174
230
  redo
175
231
  else
176
- if !row['comparison'].nil? && row['comparison'] != 'New'
177
- action = 'update'
178
- end
232
+ @ticket['sysparm_action'] = 'update' unless row['comparison'] == 'New'
179
233
  description = @common_helper.update_description(description, row)
180
234
  end
181
235
  end
182
236
 
183
237
  unless @ticket.nil? || @ticket.empty?
184
- @ticket['u_work_notes'] = @common_helper.print_description(description) unless (@ticket.size == 0)
238
+ @ticket['work_notes'] = @common_helper.print_description(description) unless (@ticket.size == 0)
185
239
  tickets.push(@ticket)
186
240
  end
187
241
  @log.log_message("Generated <#{tickets.count.to_s}> tickets.")
188
242
 
189
243
  tickets.map do |t|
190
- t.delete('sysparm_query') if t['sysparm_action'] == 'insert'
244
+ if t['sysparm_action'] == 'update'
245
+ t['sysparm_action'] = 'insert'
246
+ t['u_rpd_id'] = get_ticket_identifier(t['u_nxid'])
247
+ end
248
+
249
+ t['u_rpd_id'] ||= SecureRandom.uuid
191
250
  t.to_json
192
251
  end
193
252
  end
@@ -233,10 +292,11 @@ class ServiceNowHelper
233
292
  CSV.parse(vulnerability_list.chomp, headers: :first_row) do |row|
234
293
  @nxid = @common_helper.generate_nxid(nexpose_identifier_id, row)
235
294
  # 'state' 7 is the "Closed" state within ServiceNow.
295
+ ticket_id = get_ticket_identifier(@nxid)
236
296
  @log.log_message("Closing ticket with NXID: #{@nxid}.")
237
297
  ticket = {
238
- 'sysparm_action' => 'update',
239
- 'sysparm_query' => "active=true^u_work_notesCONTAINSNXID: #{@nxid}",
298
+ 'sysparm_action' => 'insert',
299
+ 'u_rpd_id' => ticket_id,
240
300
  'state' => '7'
241
301
  }.to_json
242
302
  tickets.push(ticket)
@@ -35,7 +35,7 @@ module NexposeTicketing
35
35
  end
36
36
  end
37
37
 
38
- def setup_logging(enabled, log_level = nil)
38
+ def setup_logging(enabled, log_level = 'info')
39
39
  unless enabled || @log.nil?
40
40
  log_message('Logging disabled.')
41
41
  return
@@ -50,7 +50,7 @@ module NexposeTicketing
50
50
  io.autoclose = false
51
51
  io.sync = true
52
52
  @log = Logger.new(io, 'weekly')
53
- @log.level = if log_level.casecmp('info') == 0
53
+ @log.level = if log_level.to_s.casecmp('info') == 0
54
54
  Logger::INFO
55
55
  else
56
56
  Logger::DEBUG
@@ -146,5 +146,10 @@ module NexposeTicketing
146
146
  end
147
147
  end
148
148
 
149
+ #Used by net library for debugging
150
+ def <<(value)
151
+ log_debug_message(value)
152
+ end
153
+
149
154
  end
150
155
  end
@@ -22,6 +22,8 @@ module NexposeReportHelper
22
22
  report_details = @nsc.last_report(report_id)
23
23
  file = Tempfile.new("#{report_id}")
24
24
  file.write(@nsc.download(report_details.uri))
25
+ file.flush
26
+
25
27
  #Got the report, cleanup server-side
26
28
  @nsc.delete_report_config(report_id)
27
29
  file
@@ -315,57 +315,58 @@ SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
315
315
  end
316
316
 
317
317
 
318
- def ticket_rate_limiter(options, query_results_file, ticket_prepare_method, ticket_send_method)
318
+ def ticket_rate_limiter(options, query_results_file, ticket_prepare_method, ticket_send_method)
319
319
  batch_size_max = (options[:batch_size] + 1)
320
320
  log_message("Batching tickets in sizes: #{options[:batch_size]}")
321
321
 
322
- #Vulnerability mode is batched by vulnerability_id. The rest are batched by ip_address.
323
- if @options[:ticket_mode] == 'V'
324
- batching_field = 'vulnerability_id'
325
- else
326
- batching_field = 'ip_address'
327
- end
328
-
322
+ #Vulnerability mode is batched by vulnerability_id, IP mode is batched by IP address.
323
+ current_id = -1
324
+ id_field = if @options[:ticket_mode] == 'V'
325
+ 'vulnerability_id'
326
+ else
327
+ 'ip_address'
328
+ end
329
+
329
330
  # Start the batching
330
331
  query_results_file.rewind
331
332
  csv_header = query_results_file.readline
332
333
  ticket_batch = []
333
- current_batching_value = -1
334
334
  current_csv_row = nil
335
335
 
336
336
  begin
337
- IO.foreach(query_results_file) do |line|
338
- ticket_batch << line
337
+ CSV.foreach(query_results_file, headers: csv_header) do |row|
338
+ ticket_batch << row
339
339
 
340
- CSV.parse(line.chomp, headers: csv_header) do |row|
341
- if current_batching_value == -1
342
- current_batching_value = row[batching_field.to_s] unless row[batching_field.to_s] == 'current_batching_value'
343
- end
344
- current_csv_row = row unless row[batching_field.to_s] == 'current_batching_value'
345
- end
340
+ #Keep updating the ID until we hit the batch 'limit'
341
+ #Should this be <=??? What happens if value n-1 is different?
346
342
 
347
- if ticket_batch.size >= batch_size_max
348
- #Batch target reached. Make sure we end with a complete IP address set (all tickets for a single IP in this batch)
349
- if(current_batching_value != current_csv_row[batching_field.to_s])
350
- log_message('Batch size reached. Sending tickets.')
351
-
352
- #Move the mismatching line to the next batch
353
- line_holder = ticket_batch.pop
354
- ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
355
- # Cleanup for the next batch
356
- ticket_batch.clear
357
- ticket_batch << csv_header
358
- ticket_batch << line_holder
359
- current_batching_value = -1
360
- end
343
+ if ticket_batch.size < batch_size_max
344
+ current_id = row[id_field]
345
+ next
361
346
  end
347
+
348
+ #Keep adding rows to get all information on an asset/vulnerability
349
+ next if @options[:ticket_mode] != 'D' && row[id_field] == current_id
350
+
351
+ #Last row is mismatch/independent
352
+ leftover_row = ticket_batch.pop
353
+
354
+ log_message('Batch size reached. Sending tickets.')
355
+ ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
356
+
357
+ ticket_batch.clear
358
+ ticket_batch << csv_header
359
+ ticket_batch << leftover_row
360
+ current_id = -1
362
361
  end
363
362
  ensure
364
363
  log_message('Finished reading report. Sending any remaining tickets and cleaning up file system.')
364
+
365
365
  ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
366
+
366
367
  query_results_file.close
367
368
  query_results_file.unlink
368
- end
369
+ end
369
370
  end
370
371
 
371
372
  def ticket_rate_limiter_processor(ticket_batch, ticket_prepare_method, ticket_send_method)
@@ -1,3 +1,3 @@
1
1
  module NexposeTicketing
2
- VERSION = "1.0.0"
2
+ VERSION = "1.0.1"
3
3
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: nexpose_ticketing
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0
4
+ version: 1.0.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Damian Finol
@@ -10,94 +10,94 @@ authors:
10
10
  autorequire:
11
11
  bindir: bin
12
12
  cert_chain: []
13
- date: 2015-12-10 00:00:00.000000000 Z
13
+ date: 2016-01-19 00:00:00.000000000 Z
14
14
  dependencies:
15
15
  - !ruby/object:Gem::Dependency
16
16
  name: nexpose
17
17
  requirement: !ruby/object:Gem::Requirement
18
18
  requirements:
19
- - - "~>"
19
+ - - ~>
20
20
  - !ruby/object:Gem::Version
21
21
  version: '2.1'
22
- - - ">="
22
+ - - ! '>='
23
23
  - !ruby/object:Gem::Version
24
24
  version: 2.1.0
25
25
  type: :runtime
26
26
  prerelease: false
27
27
  version_requirements: !ruby/object:Gem::Requirement
28
28
  requirements:
29
- - - "~>"
29
+ - - ~>
30
30
  - !ruby/object:Gem::Version
31
31
  version: '2.1'
32
- - - ">="
32
+ - - ! '>='
33
33
  - !ruby/object:Gem::Version
34
34
  version: 2.1.0
35
35
  - !ruby/object:Gem::Dependency
36
36
  name: savon
37
37
  requirement: !ruby/object:Gem::Requirement
38
38
  requirements:
39
- - - "~>"
39
+ - - ~>
40
40
  - !ruby/object:Gem::Version
41
41
  version: '2.1'
42
42
  type: :runtime
43
43
  prerelease: false
44
44
  version_requirements: !ruby/object:Gem::Requirement
45
45
  requirements:
46
- - - "~>"
46
+ - - ~>
47
47
  - !ruby/object:Gem::Version
48
48
  version: '2.1'
49
49
  - !ruby/object:Gem::Dependency
50
50
  name: nokogiri
51
51
  requirement: !ruby/object:Gem::Requirement
52
52
  requirements:
53
- - - "~>"
53
+ - - ~>
54
54
  - !ruby/object:Gem::Version
55
55
  version: '1.6'
56
56
  type: :runtime
57
57
  prerelease: false
58
58
  version_requirements: !ruby/object:Gem::Requirement
59
59
  requirements:
60
- - - "~>"
60
+ - - ~>
61
61
  - !ruby/object:Gem::Version
62
62
  version: '1.6'
63
63
  - !ruby/object:Gem::Dependency
64
64
  name: rspec
65
65
  requirement: !ruby/object:Gem::Requirement
66
66
  requirements:
67
- - - "~>"
67
+ - - ~>
68
68
  - !ruby/object:Gem::Version
69
69
  version: '3.2'
70
- - - ">="
70
+ - - ! '>='
71
71
  - !ruby/object:Gem::Version
72
72
  version: 3.2.0
73
73
  type: :development
74
74
  prerelease: false
75
75
  version_requirements: !ruby/object:Gem::Requirement
76
76
  requirements:
77
- - - "~>"
77
+ - - ~>
78
78
  - !ruby/object:Gem::Version
79
79
  version: '3.2'
80
- - - ">="
80
+ - - ! '>='
81
81
  - !ruby/object:Gem::Version
82
82
  version: 3.2.0
83
83
  - !ruby/object:Gem::Dependency
84
84
  name: rspec-mocks
85
85
  requirement: !ruby/object:Gem::Requirement
86
86
  requirements:
87
- - - "~>"
87
+ - - ~>
88
88
  - !ruby/object:Gem::Version
89
89
  version: '3.2'
90
- - - ">="
90
+ - - ! '>='
91
91
  - !ruby/object:Gem::Version
92
92
  version: 3.2.0
93
93
  type: :development
94
94
  prerelease: false
95
95
  version_requirements: !ruby/object:Gem::Requirement
96
96
  requirements:
97
- - - "~>"
97
+ - - ~>
98
98
  - !ruby/object:Gem::Version
99
99
  version: '3.2'
100
- - - ">="
100
+ - - ! '>='
101
101
  - !ruby/object:Gem::Version
102
102
  version: 3.2.0
103
103
  description: This gem provides a Ruby implementation of different integrations with
@@ -127,7 +127,7 @@ files:
127
127
  - lib/nexpose_ticketing/config/remedy_wsdl/HPD_IncidentInterface_WS.xml
128
128
  - lib/nexpose_ticketing/config/servicedesk.config
129
129
  - lib/nexpose_ticketing/config/servicenow.config
130
- - lib/nexpose_ticketing/config/servicenow_updateset/Rapid7 Nexpose Ticketing.glide-calgary-02-15-2013__patch2-hotfix5.xml
130
+ - lib/nexpose_ticketing/config/servicenow_updateset/Rapid7_Nexpose_Ticketing_ServiceNow_update_set.xml
131
131
  - lib/nexpose_ticketing/config/ticket_service.config
132
132
  - lib/nexpose_ticketing/helpers/jira_helper.rb
133
133
  - lib/nexpose_ticketing/helpers/remedy_helper.rb
@@ -149,17 +149,17 @@ require_paths:
149
149
  - lib
150
150
  required_ruby_version: !ruby/object:Gem::Requirement
151
151
  requirements:
152
- - - ">="
152
+ - - ! '>='
153
153
  - !ruby/object:Gem::Version
154
154
  version: '1.9'
155
155
  required_rubygems_version: !ruby/object:Gem::Requirement
156
156
  requirements:
157
- - - ">="
157
+ - - ! '>='
158
158
  - !ruby/object:Gem::Version
159
159
  version: '0'
160
160
  requirements: []
161
161
  rubyforge_project:
162
- rubygems_version: 2.4.3
162
+ rubygems_version: 2.2.2
163
163
  signing_key:
164
164
  specification_version: 4
165
165
  summary: Ruby Nexpose Ticketing Engine.
@@ -1,390 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8"?>
2
- <unload unload_date="2014-04-08 18:08:57">
3
- <sys_remote_update_set action="INSERT_OR_UPDATE">
4
- <collisions/>
5
- <commit_date/>
6
- <deleted/>
7
- <description>Rapid7 Nexpose Ticketing Integration.
8
-
9
- Support Email: integrations_support@rapid7.com
10
- Support Phone: (866) 390-8113
11
- </description>
12
- <inserted/>
13
- <name>Rapid7 Nexpose Ticketing</name>
14
- <origin_sys_id/>
15
- <release_date>2014-04-08 18:02:17</release_date>
16
- <remote_sys_id>06382388340c6140df776b3ac83c75d9</remote_sys_id>
17
- <state>loaded</state>
18
- <summary/>
19
- <sys_created_by>admin</sys_created_by>
20
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
21
- <sys_id>1fe9af88340c6140df776b3ac83c7535</sys_id>
22
- <sys_mod_count>0</sys_mod_count>
23
- <sys_updated_by>admin</sys_updated_by>
24
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
25
- <target_release>5c668567404bc1003f8e0fc5040a3290</target_release>
26
- <update_set display_value=""/>
27
- <update_source display_value=""/>
28
- <updated/>
29
- <vendor_key>rpd</vendor_key>
30
- <version>glide-calgary-02-15-2013__patch2-hotfix5</version>
31
- </sys_remote_update_set>
32
- <sys_update_xml action="INSERT_OR_UPDATE">
33
- <action>INSERT_OR_UPDATE</action>
34
- <application display_value=""/>
35
- <category>customer</category>
36
- <comments/>
37
- <name>sys_transform_map_7b19ab88340c6140df776b3ac83c7591</name>
38
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_map"><sys_transform_map action="INSERT_OR_UPDATE"><active>true</active><copy_empty_fields>false</copy_empty_fields><enforce_mandatory_fields>No</enforce_mandatory_fields><name>Vulnerabilities to Tickets</name><order>100</order><run_business_rules>true</run_business_rules><run_script>false</run_script><script><![CDATA[/**
39
- * For variables go to: http://wiki.service-now.com/index.php?title=Import_Sets
40
- **/
41
- ]]]]><![CDATA[></script><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:05:49</sys_created_on><sys_id>7b19ab88340c6140df776b3ac83c7591</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:05:49</sys_updated_on><target_table>incident</target_table></sys_transform_map><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$,/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:05:49</sys_created_on><sys_id>95396748340c6140df776b3ac83c7574</sys_id><sys_mod_count>0</sys_mod_count><sys_name>Vulnerabilities to Tickets</sys_name><sys_parent/><sys_path>!!1$,/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>7b19ab88340c6140df776b3ac83c7591</sys_source_id><sys_source_table>sys_transform_map</sys_source_table><sys_type/><sys_update_name>sys_transform_map_7b19ab88340c6140df776b3ac83c7591</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:05:49</sys_updated_on></sys_app_file></record_update>]]></payload>
42
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
43
- <replace_on_upgrade>false</replace_on_upgrade>
44
- <sys_created_by>admin</sys_created_by>
45
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
46
- <sys_id>13e9af88340c6140df776b3ac83c7539</sys_id>
47
- <sys_mod_count>0</sys_mod_count>
48
- <sys_updated_by>admin</sys_updated_by>
49
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
50
- <table/>
51
- <target_name>Vulnerabilities to Tickets</target_name>
52
- <type>Table Transform Map</type>
53
- <update_domain>global</update_domain>
54
- <update_set display_value=""/>
55
- <view/>
56
- </sys_update_xml>
57
- <sys_update_xml action="INSERT_OR_UPDATE">
58
- <action>INSERT_OR_UPDATE</action>
59
- <application display_value=""/>
60
- <category>customer</category>
61
- <comments/>
62
- <name>sys_transform_entry_7369eb88340c6140df776b3ac83c7537</name>
63
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_caller_id</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7369eb88340c6140df776b3ac83c7537</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>caller_id</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$3/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>bb69eb88340c6140df776b3ac83c7537</sys_id><sys_mod_count>0</sys_mod_count><sys_name>7369eb88340c6140df776b3ac83c7537</sys_name><sys_parent/><sys_path>!!1$3/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>7369eb88340c6140df776b3ac83c7537</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_7369eb88340c6140df776b3ac83c7537</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
64
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
65
- <replace_on_upgrade>false</replace_on_upgrade>
66
- <sys_created_by>admin</sys_created_by>
67
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
68
- <sys_id>17e9af88340c6140df776b3ac83c7538</sys_id>
69
- <sys_mod_count>0</sys_mod_count>
70
- <sys_updated_by>admin</sys_updated_by>
71
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
72
- <table/>
73
- <target_name>7369eb88340c6140df776b3ac83c7537</target_name>
74
- <type>Field Map</type>
75
- <update_domain>global</update_domain>
76
- <update_set display_value=""/>
77
- <view/>
78
- </sys_update_xml>
79
- <sys_update_xml action="INSERT_OR_UPDATE">
80
- <action>INSERT</action>
81
- <application display_value=""/>
82
- <category>customer</category>
83
- <comments/>
84
- <name>sys_dictionary_u_rpd_vulnerabilities_u_urgency</name>
85
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_urgency" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>urgency</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_urgency</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="Integer">integer</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:57</sys_created_on><sys_id>a33d099634735140df776b3ac83c759d</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#N/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:33</sys_created_on><sys_id>175d499634735140df776b3ac83c752f</sys_id><sys_mod_count>0</sys_mod_count><sys_name>urgency</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#N/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_urgency" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">a33d099634735140df776b3ac83c759d</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_urgency</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on></sys_app_file></record_update>]]></payload>
86
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
87
- <replace_on_upgrade>false</replace_on_upgrade>
88
- <sys_created_by>admin</sys_created_by>
89
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
90
- <sys_id>1be9af88340c6140df776b3ac83c7537</sys_id>
91
- <sys_mod_count>0</sys_mod_count>
92
- <sys_updated_by>admin</sys_updated_by>
93
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
94
- <table>u_rpd_vulnerabilities</table>
95
- <target_name>Vulnerabilities.u_urgency</target_name>
96
- <type>Dictionary</type>
97
- <update_domain>global</update_domain>
98
- <update_set display_value=""/>
99
- <view/>
100
- </sys_update_xml>
101
- <sys_update_xml action="INSERT_OR_UPDATE">
102
- <action>INSERT</action>
103
- <application display_value=""/>
104
- <category>customer</category>
105
- <comments/>
106
- <name>sys_dictionary_u_rpd_vulnerabilities_u_caller_id</name>
107
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_caller_id" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>caller_id</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_caller_id</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:59</sys_created_on><sys_id>d72d099634735140df776b3ac83c7592</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:59</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#F/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:32</sys_created_on><sys_id>0f5d499634735140df776b3ac83c7502</sys_id><sys_mod_count>0</sys_mod_count><sys_name>caller_id</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#F/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_caller_id" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">d72d099634735140df776b3ac83c7592</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_caller_id</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:59</sys_updated_on></sys_app_file></record_update>]]></payload>
108
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
109
- <replace_on_upgrade>false</replace_on_upgrade>
110
- <sys_created_by>admin</sys_created_by>
111
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
112
- <sys_id>1fe9af88340c6140df776b3ac83c7536</sys_id>
113
- <sys_mod_count>0</sys_mod_count>
114
- <sys_updated_by>admin</sys_updated_by>
115
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
116
- <table>u_rpd_vulnerabilities</table>
117
- <target_name>Vulnerabilities.u_caller_id</target_name>
118
- <type>Dictionary</type>
119
- <update_domain>global</update_domain>
120
- <update_set display_value=""/>
121
- <view/>
122
- </sys_update_xml>
123
- <sys_update_xml action="INSERT_OR_UPDATE">
124
- <action>INSERT_OR_UPDATE</action>
125
- <application display_value=""/>
126
- <category>customer</category>
127
- <comments/>
128
- <name>sys_transform_entry_3f69a788340c6140df776b3ac83c752f</name>
129
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_urgency</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>3f69a788340c6140df776b3ac83c752f</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>urgency</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$./</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7769a788340c6140df776b3ac83c7530</sys_id><sys_mod_count>0</sys_mod_count><sys_name>3f69a788340c6140df776b3ac83c752f</sys_name><sys_parent/><sys_path>!!1$./</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>3f69a788340c6140df776b3ac83c752f</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_3f69a788340c6140df776b3ac83c752f</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
130
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
131
- <replace_on_upgrade>false</replace_on_upgrade>
132
- <sys_created_by>admin</sys_created_by>
133
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
134
- <sys_id>53e9af88340c6140df776b3ac83c7538</sys_id>
135
- <sys_mod_count>0</sys_mod_count>
136
- <sys_updated_by>admin</sys_updated_by>
137
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
138
- <table/>
139
- <target_name>3f69a788340c6140df776b3ac83c752f</target_name>
140
- <type>Field Map</type>
141
- <update_domain>global</update_domain>
142
- <update_set display_value=""/>
143
- <view/>
144
- </sys_update_xml>
145
- <sys_update_xml action="INSERT_OR_UPDATE">
146
- <action>INSERT</action>
147
- <application display_value=""/>
148
- <category>customer</category>
149
- <comments/>
150
- <name>sys_dictionary_u_rpd_vulnerabilities_u_short_description</name>
151
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_short_description" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>short_description</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_short_description</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:57</sys_created_on><sys_id>6e3d099634735140df776b3ac83c759a</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#L/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:33</sys_created_on><sys_id>575d499634735140df776b3ac83c7524</sys_id><sys_mod_count>0</sys_mod_count><sys_name>short_description</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#L/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_short_description" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">6e3d099634735140df776b3ac83c759a</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_short_description</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on></sys_app_file></record_update>]]></payload>
152
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
153
- <replace_on_upgrade>false</replace_on_upgrade>
154
- <sys_created_by>admin</sys_created_by>
155
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
156
- <sys_id>57e9af88340c6140df776b3ac83c7537</sys_id>
157
- <sys_mod_count>0</sys_mod_count>
158
- <sys_updated_by>admin</sys_updated_by>
159
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
160
- <table>u_rpd_vulnerabilities</table>
161
- <target_name>Vulnerabilities.u_short_description</target_name>
162
- <type>Dictionary</type>
163
- <update_domain>global</update_domain>
164
- <update_set display_value=""/>
165
- <view/>
166
- </sys_update_xml>
167
- <sys_update_xml action="INSERT_OR_UPDATE">
168
- <action>INSERT_OR_UPDATE</action>
169
- <application display_value=""/>
170
- <category>customer</category>
171
- <comments/>
172
- <name>sys_app_module_eea92f88340c6140df776b3ac83c75ff</name>
173
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update sys_domain="global" table="sys_app_module"><sys_app_module action="INSERT_OR_UPDATE"><active>true</active><application display_value="Rapid7 Nexpose Support">6f89eb88340c6140df776b3ac83c75e5</application><content_page/><filter/><hint>Nexpose Support</hint><homepage/><image/><link_type>DIRECT</link_type><map_page/><name/><order/><query>http://www.rapid7.com/support/</query><report/><roles>admin</roles><survey/><survey_overwrite>true</survey_overwrite><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:08:18</sys_created_on><sys_domain>global</sys_domain><sys_id>eea92f88340c6140df776b3ac83c75ff</sys_id><sys_mod_count>0</sys_mod_count><sys_overrides/><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:08:18</sys_updated_on><timeline_page/><title>Nexpose Support</title><uncancelable>false</uncancelable><view_name/><window_name/></sys_app_module><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$5/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:08:18</sys_created_on><sys_id>f5c9eb48340c6140df776b3ac83c75e4</sys_id><sys_mod_count>0</sys_mod_count><sys_name>Nexpose Support</sys_name><sys_parent/><sys_path>!!1$5/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>eea92f88340c6140df776b3ac83c75ff</sys_source_id><sys_source_table>sys_app_module</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_app_module_eea92f88340c6140df776b3ac83c75ff</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:08:18</sys_updated_on></sys_app_file></record_update>]]></payload>
174
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
175
- <replace_on_upgrade>false</replace_on_upgrade>
176
- <sys_created_by>admin</sys_created_by>
177
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
178
- <sys_id>5be9af88340c6140df776b3ac83c7536</sys_id>
179
- <sys_mod_count>0</sys_mod_count>
180
- <sys_updated_by>admin</sys_updated_by>
181
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
182
- <table/>
183
- <target_name>Nexpose Support</target_name>
184
- <type>Module</type>
185
- <update_domain>global</update_domain>
186
- <update_set display_value=""/>
187
- <view/>
188
- </sys_update_xml>
189
- <sys_update_xml action="INSERT_OR_UPDATE">
190
- <action>INSERT_OR_UPDATE</action>
191
- <application display_value=""/>
192
- <category>customer</category>
193
- <comments/>
194
- <name>sys_transform_entry_ff69eb88340c6140df776b3ac83c7533</name>
195
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_impact</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>ff69eb88340c6140df776b3ac83c7533</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>impact</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$1/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>3b69eb88340c6140df776b3ac83c7534</sys_id><sys_mod_count>0</sys_mod_count><sys_name>ff69eb88340c6140df776b3ac83c7533</sys_name><sys_parent/><sys_path>!!1$1/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>ff69eb88340c6140df776b3ac83c7533</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_ff69eb88340c6140df776b3ac83c7533</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
196
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
197
- <replace_on_upgrade>false</replace_on_upgrade>
198
- <sys_created_by>admin</sys_created_by>
199
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
200
- <sys_id>5fe9af88340c6140df776b3ac83c7538</sys_id>
201
- <sys_mod_count>0</sys_mod_count>
202
- <sys_updated_by>admin</sys_updated_by>
203
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
204
- <table/>
205
- <target_name>ff69eb88340c6140df776b3ac83c7533</target_name>
206
- <type>Field Map</type>
207
- <update_domain>global</update_domain>
208
- <update_set display_value=""/>
209
- <view/>
210
- </sys_update_xml>
211
- <sys_update_xml action="INSERT_OR_UPDATE">
212
- <action>INSERT</action>
213
- <application display_value=""/>
214
- <category>customer</category>
215
- <comments/>
216
- <name>sys_dictionary_u_rpd_vulnerabilities_u_impact</name>
217
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_impact" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>impact</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_impact</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="Integer">integer</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:58</sys_created_on><sys_id>0a3d099634735140df776b3ac83c7598</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#J/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:33</sys_created_on><sys_id>475d499634735140df776b3ac83c7519</sys_id><sys_mod_count>0</sys_mod_count><sys_name>impact</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#J/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_impact" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">0a3d099634735140df776b3ac83c7598</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_impact</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on></sys_app_file></record_update>]]></payload>
218
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
219
- <replace_on_upgrade>false</replace_on_upgrade>
220
- <sys_created_by>admin</sys_created_by>
221
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
222
- <sys_id>93e9af88340c6140df776b3ac83c7537</sys_id>
223
- <sys_mod_count>0</sys_mod_count>
224
- <sys_updated_by>admin</sys_updated_by>
225
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
226
- <table>u_rpd_vulnerabilities</table>
227
- <target_name>Vulnerabilities.u_impact</target_name>
228
- <type>Dictionary</type>
229
- <update_domain>global</update_domain>
230
- <update_set display_value=""/>
231
- <view/>
232
- </sys_update_xml>
233
- <sys_update_xml action="INSERT_OR_UPDATE">
234
- <action>INSERT_OR_UPDATE</action>
235
- <application display_value=""/>
236
- <category>customer</category>
237
- <comments/>
238
- <name>sys_app_application_6f89eb88340c6140df776b3ac83c75e5</name>
239
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update sys_domain="global" table="sys_app_application"><sys_app_application action="INSERT_OR_UPDATE"><active>true</active><category display_value="Custom Applications">e0355b31ef303000a61d5a3615c0fb78</category><description>Rapid7 Nexpose Ticketing Integration.&#13;
240
- &#13;
241
- Support Email: integrations_support@rapid7.com&#13;
242
- Support Phone: (866) 390-8113</description><device_type>browser</device_type><hint>Rapid7 Nexpose Support</hint><name>rapid7_nexpose_support</name><order>100</order><roles>admin</roles><sys_app_file/><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:07:38</sys_created_on><sys_domain>global</sys_domain><sys_id>6f89eb88340c6140df776b3ac83c75e5</sys_id><sys_mod_count>0</sys_mod_count><sys_overrides/><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:07:38</sys_updated_on><title>Rapid7 Nexpose Support</title><view_name/></sys_app_application><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$4/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:07:38</sys_created_on><sys_id>f399eb88340c6140df776b3ac83c75ed</sys_id><sys_mod_count>0</sys_mod_count><sys_name>Rapid7 Nexpose Support</sys_name><sys_parent/><sys_path>!!1$4/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>6f89eb88340c6140df776b3ac83c75e5</sys_source_id><sys_source_table>sys_app_application</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_app_application_6f89eb88340c6140df776b3ac83c75e5</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:07:38</sys_updated_on></sys_app_file></record_update>]]></payload>
243
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
244
- <replace_on_upgrade>false</replace_on_upgrade>
245
- <sys_created_by>admin</sys_created_by>
246
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
247
- <sys_id>97e9af88340c6140df776b3ac83c7536</sys_id>
248
- <sys_mod_count>0</sys_mod_count>
249
- <sys_updated_by>admin</sys_updated_by>
250
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
251
- <table/>
252
- <target_name>Rapid7 Nexpose Support</target_name>
253
- <type>Application Menu</type>
254
- <update_domain>global</update_domain>
255
- <update_set display_value=""/>
256
- <view/>
257
- </sys_update_xml>
258
- <sys_update_xml action="INSERT_OR_UPDATE">
259
- <action>INSERT_OR_UPDATE</action>
260
- <application display_value=""/>
261
- <category>customer</category>
262
- <comments/>
263
- <name>sys_transform_entry_af69a788340c6140df776b3ac83c752d</name>
264
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_work_notes</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>af69a788340c6140df776b3ac83c752d</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>work_notes</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$-/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>6b69a788340c6140df776b3ac83c752e</sys_id><sys_mod_count>0</sys_mod_count><sys_name>af69a788340c6140df776b3ac83c752d</sys_name><sys_parent/><sys_path>!!1$-/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>af69a788340c6140df776b3ac83c752d</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_af69a788340c6140df776b3ac83c752d</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
265
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
266
- <replace_on_upgrade>false</replace_on_upgrade>
267
- <sys_created_by>admin</sys_created_by>
268
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
269
- <sys_id>9be9af88340c6140df776b3ac83c7538</sys_id>
270
- <sys_mod_count>0</sys_mod_count>
271
- <sys_updated_by>admin</sys_updated_by>
272
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
273
- <table/>
274
- <target_name>af69a788340c6140df776b3ac83c752d</target_name>
275
- <type>Field Map</type>
276
- <update_domain>global</update_domain>
277
- <update_set display_value=""/>
278
- <view/>
279
- </sys_update_xml>
280
- <sys_update_xml action="INSERT_OR_UPDATE">
281
- <action>INSERT_OR_UPDATE</action>
282
- <application display_value=""/>
283
- <category>customer</category>
284
- <comments/>
285
- <name>sys_transform_entry_3b69eb88340c6140df776b3ac83c7535</name>
286
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_category</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>3b69eb88340c6140df776b3ac83c7535</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>category</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$2/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7369eb88340c6140df776b3ac83c7536</sys_id><sys_mod_count>0</sys_mod_count><sys_name>3b69eb88340c6140df776b3ac83c7535</sys_name><sys_parent/><sys_path>!!1$2/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>3b69eb88340c6140df776b3ac83c7535</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_3b69eb88340c6140df776b3ac83c7535</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
287
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
288
- <replace_on_upgrade>false</replace_on_upgrade>
289
- <sys_created_by>admin</sys_created_by>
290
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
291
- <sys_id>9fe9af88340c6140df776b3ac83c7537</sys_id>
292
- <sys_mod_count>0</sys_mod_count>
293
- <sys_updated_by>admin</sys_updated_by>
294
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
295
- <table/>
296
- <target_name>3b69eb88340c6140df776b3ac83c7535</target_name>
297
- <type>Field Map</type>
298
- <update_domain>global</update_domain>
299
- <update_set display_value=""/>
300
- <view/>
301
- </sys_update_xml>
302
- <sys_update_xml action="INSERT_OR_UPDATE">
303
- <action>INSERT</action>
304
- <application display_value=""/>
305
- <category>customer</category>
306
- <comments/>
307
- <name>dictionary_u_rpd_vulnerabilities_55952fb42c46425d84de8f4fda4ce339</name>
308
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><database><element extends="sys_import_set_row" label="Vulnerabilities" name="u_rpd_vulnerabilities" type="collection"><element label="work_notes" max_length="50000" name="u_work_notes" type="string"/><element label="urgency" max_length="40" name="u_urgency" type="integer"/><element label="short_description" max_length="40" name="u_short_description" type="string"/><element label="category" max_length="40" name="u_category" type="string"/><element label="impact" max_length="40" name="u_impact" type="integer"/><element label="caller_id" max_length="40" name="u_caller_id" type="string"/></element></database><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#D/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:14:25</sys_created_on><sys_id>221dc59634735140df776b3ac83c75c2</sys_id><sys_mod_count>0</sys_mod_count><sys_name>u_rpd_vulnerabilities</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#D/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="NULL" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">ee1dc59634735140df776b3ac83c75c0</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>dictionary_u_rpd_vulnerabilities_55952fb42c46425d84de8f4fda4ce339</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:59</sys_updated_on></sys_app_file></record_update>]]></payload>
309
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
310
- <replace_on_upgrade>false</replace_on_upgrade>
311
- <sys_created_by>admin</sys_created_by>
312
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
313
- <sys_id>d3e9af88340c6140df776b3ac83c7536</sys_id>
314
- <sys_mod_count>0</sys_mod_count>
315
- <sys_updated_by>admin</sys_updated_by>
316
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
317
- <table>u_rpd_vulnerabilities</table>
318
- <target_name>Vulnerabilities</target_name>
319
- <type>Database field(s)</type>
320
- <update_domain>global</update_domain>
321
- <update_set display_value=""/>
322
- <view/>
323
- </sys_update_xml>
324
- <sys_update_xml action="INSERT_OR_UPDATE">
325
- <action>INSERT_OR_UPDATE</action>
326
- <application display_value=""/>
327
- <category>customer</category>
328
- <comments/>
329
- <name>sys_transform_entry_7769a788340c6140df776b3ac83c7531</name>
330
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update table="sys_transform_entry"><sys_transform_entry action="INSERT_OR_UPDATE"><choice_action>create</choice_action><coalesce>false</coalesce><coalesce_case_sensitive>false</coalesce_case_sensitive><coalesce_empty_fields>false</coalesce_empty_fields><date_format>yyyy-MM-dd hh:mm:ss</date_format><map display_value="Vulnerabilities to Tickets">7b19ab88340c6140df776b3ac83c7591</map><reference_value_field/><source_field>u_short_description</source_field><source_script/><source_table>u_rpd_vulnerabilities</source_table><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>7769a788340c6140df776b3ac83c7531</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on><target_field>short_description</target_field><target_table>incident</target_table><use_source_script>false</use_source_script></sys_transform_entry><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1$0/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:06:48</sys_created_on><sys_id>bf69a788340c6140df776b3ac83c7531</sys_id><sys_mod_count>0</sys_mod_count><sys_name>7769a788340c6140df776b3ac83c7531</sys_name><sys_parent/><sys_path>!!1$0/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id>7769a788340c6140df776b3ac83c7531</sys_source_id><sys_source_table>sys_transform_entry</sys_source_table><sys_type/><sys_update_name>sys_transform_entry_7769a788340c6140df776b3ac83c7531</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:06:48</sys_updated_on></sys_app_file></record_update>]]></payload>
331
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
332
- <replace_on_upgrade>false</replace_on_upgrade>
333
- <sys_created_by>admin</sys_created_by>
334
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
335
- <sys_id>d7e9af88340c6140df776b3ac83c7538</sys_id>
336
- <sys_mod_count>0</sys_mod_count>
337
- <sys_updated_by>admin</sys_updated_by>
338
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
339
- <table/>
340
- <target_name>7769a788340c6140df776b3ac83c7531</target_name>
341
- <type>Field Map</type>
342
- <update_domain>global</update_domain>
343
- <update_set display_value=""/>
344
- <view/>
345
- </sys_update_xml>
346
- <sys_update_xml action="INSERT_OR_UPDATE">
347
- <action>INSERT</action>
348
- <application display_value=""/>
349
- <category>customer</category>
350
- <comments/>
351
- <name>sys_dictionary_u_rpd_vulnerabilities_u_work_notes</name>
352
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_work_notes" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>work_notes</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_work_notes</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:57</sys_created_on><sys_id>d04d099634735140df776b3ac83c75d1</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#P/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:34</sys_created_on><sys_id>d35d499634735140df776b3ac83c753a</sys_id><sys_mod_count>0</sys_mod_count><sys_name>work_notes</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#P/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_work_notes" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">d04d099634735140df776b3ac83c75d1</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_work_notes</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:57</sys_updated_on></sys_app_file></record_update>]]></payload>
353
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
354
- <replace_on_upgrade>false</replace_on_upgrade>
355
- <sys_created_by>admin</sys_created_by>
356
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
357
- <sys_id>dbe9af88340c6140df776b3ac83c7537</sys_id>
358
- <sys_mod_count>0</sys_mod_count>
359
- <sys_updated_by>admin</sys_updated_by>
360
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
361
- <table>u_rpd_vulnerabilities</table>
362
- <target_name>Vulnerabilities.u_work_notes</target_name>
363
- <type>Dictionary</type>
364
- <update_domain>global</update_domain>
365
- <update_set display_value=""/>
366
- <view/>
367
- </sys_update_xml>
368
- <sys_update_xml action="INSERT_OR_UPDATE">
369
- <action>INSERT</action>
370
- <application display_value=""/>
371
- <category>customer</category>
372
- <comments/>
373
- <name>sys_dictionary_u_rpd_vulnerabilities_u_category</name>
374
- <payload><![CDATA[<?xml version="1.0" encoding="UTF-8"?><record_update><sys_dictionary action="INSERT" element="u_category" table="u_rpd_vulnerabilities"><active>true</active><array>false</array><attributes/><audit>false</audit><calculation/><choice/><choice_field/><choice_table/><column_label>category</column_label><comments/><create_roles/><default_value/><defaultsort/><delete_roles/><dependent/><display>false</display><dynamic_creation>false</dynamic_creation><dynamic_creation_script/><element>u_category</element><element_reference>false</element_reference><foreign_database/><internal_type display_value="String">string</internal_type><mandatory>false</mandatory><max_length>40</max_length><name>u_rpd_vulnerabilities</name><next_element/><primary>false</primary><read_only>false</read_only><read_roles/><reference/><reference_cascade_rule/><reference_floats>false</reference_floats><reference_key/><reference_qual/><reference_type/><sizeclass/><spell_check>false</spell_check><sys_class_name>sys_dictionary</sys_class_name><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-08 18:04:58</sys_created_on><sys_id>853d099634735140df776b3ac83c7595</sys_id><sys_mod_count>0</sys_mod_count><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on><table_reference>false</table_reference><text_index>false</text_index><unique>false</unique><virtual>false</virtual><widget/><write_roles/><xml_view>false</xml_view></sys_dictionary><sys_app_file action="INSERT_OR_UPDATE"><sys_app/><sys_code>!!1#H/</sys_code><sys_created_by>admin</sys_created_by><sys_created_on>2014-04-02 20:15:32</sys_created_on><sys_id>875d499634735140df776b3ac83c750e</sys_id><sys_mod_count>0</sys_mod_count><sys_name>category</sys_name><sys_parent display_value="Rpd Vulnerabilities">2a1dc59634735140df776b3ac83c75ae</sys_parent><sys_path>!!1#C/!!1#H/</sys_path><sys_policy/><sys_source_deleted>false</sys_source_deleted><sys_source_id element="u_category" name="u_rpd_vulnerabilities" sys_source_table="sys_dictionary">853d099634735140df776b3ac83c7595</sys_source_id><sys_source_table>sys_dictionary</sys_source_table><sys_type>code</sys_type><sys_update_name>sys_dictionary_u_rpd_vulnerabilities_u_category</sys_update_name><sys_updated_by>admin</sys_updated_by><sys_updated_on>2014-04-08 18:04:58</sys_updated_on></sys_app_file></record_update>]]></payload>
375
- <remote_update_set display_value="Rapid7 Nexpose Ticketing">1fe9af88340c6140df776b3ac83c7535</remote_update_set>
376
- <replace_on_upgrade>false</replace_on_upgrade>
377
- <sys_created_by>admin</sys_created_by>
378
- <sys_created_on>2014-04-08 18:08:57</sys_created_on>
379
- <sys_id>dfe9af88340c6140df776b3ac83c7536</sys_id>
380
- <sys_mod_count>0</sys_mod_count>
381
- <sys_updated_by>admin</sys_updated_by>
382
- <sys_updated_on>2014-04-08 18:08:57</sys_updated_on>
383
- <table>u_rpd_vulnerabilities</table>
384
- <target_name>Vulnerabilities.u_category</target_name>
385
- <type>Dictionary</type>
386
- <update_domain>global</update_domain>
387
- <update_set display_value=""/>
388
- <view/>
389
- </sys_update_xml>
390
- </unload>