pub struct Item<'input> {Show 27 fields
pub plugin_id: u32,
pub plugin_name: Cow<'input, str>,
pub port: u16,
pub protocol: Protocol,
pub svc_name: &'input str,
pub severity: Level,
pub plugin_family: &'input str,
pub plugin_output: Option<Cow<'input, str>>,
pub solution: Cow<'input, str>,
pub script_version: &'input str,
pub risk_factor: Level,
pub plugin_type: PluginType,
pub plugin_publication_date: Date,
pub plugin_modification_date: Date,
pub fname: &'input str,
pub description: Cow<'input, str>,
pub exploit_available: bool,
pub exploited_by_nessus: bool,
pub exploitability_ease: Option<&'input str>,
pub agent: Option<&'input str>,
pub cvss_vector: Option<&'input str>,
pub cvss_temporal_vector: Option<&'input str>,
pub cvss3_vector: Option<&'input str>,
pub cvss3_temporal_vector: Option<&'input str>,
pub cvss4_vector: Option<&'input str>,
pub cvss4_threat_vector: Option<&'input str>,
pub others: HashMap<&'input str, Vec<Cow<'input, str>>>,
}Expand description
Represents a <ReportItem> element, which is a single finding or piece of
information reported by a Nessus plugin for a specific host and port.
Fields§
§plugin_id: u32The unique identifier of the Nessus plugin that generated this item.
plugin_name: Cow<'input, str>The name of the plugin.
port: u16The port number associated with this finding.
protocol: ProtocolThe protocol associated with the port (TCP, UDP, ICMP).
svc_name: &'input strThe service name discovered on the port (e.g., “www”, “general”).
severity: LevelThe severity level of the finding.
plugin_family: &'input strThe family that the plugin belongs to (e.g., “Windows”, “CGI abuses”).
plugin_output: Option<Cow<'input, str>>The raw output from the plugin, which often contains detailed evidence.
solution: Cow<'input, str>The suggested solution or remediation for the finding.
script_version: &'input strThe version of the plugin script.
risk_factor: LevelThe risk factor associated with the finding (e.g., “High”, “None”).
plugin_type: PluginTypeThe type of the plugin (e.g., remote, local).
plugin_publication_date: DateThe date when the plugin was first published.
plugin_modification_date: DateThe date when the plugin was last modified.
fname: &'input strThe filename of the plugin script (e.g., “example.nasl”).
description: Cow<'input, str>A detailed description of the vulnerability or finding.
exploit_available: boolA boolean indicating if a known exploit for the vulnerability exists.
exploited_by_nessus: boolA boolean indicating if the vulnerability was exploited by Nessus during the scan.
exploitability_ease: Option<&'input str>A description of how easy it is to exploit the vulnerability.
agent: Option<&'input str>The agent type the plugin is applicable to (“all”, “unix”, “windows”).
cvss_vector: Option<&'input str>The CVSSv2 vector string.
cvss_temporal_vector: Option<&'input str>The CVSSv2 temporal vector string.
cvss3_vector: Option<&'input str>The CVSSv3 vector string.
cvss3_temporal_vector: Option<&'input str>The CVSSv3 temporal vector string.
cvss4_vector: Option<&'input str>The CVSSv4 vector string.
cvss4_threat_vector: Option<&'input str>The CVSSv4 threat vector string.
others: HashMap<&'input str, Vec<Cow<'input, str>>>A map to hold any other elements from the ReportItem not explicitly parsed into other fields. The key is the XML tag name.