diff options
Diffstat (limited to 'data/example_data_1.json')
-rw-r--r-- | data/example_data_1.json | 57 |
1 files changed, 0 insertions, 57 deletions
diff --git a/data/example_data_1.json b/data/example_data_1.json deleted file mode 100644 index 69f5d85..0000000 --- a/data/example_data_1.json +++ /dev/null @@ -1,57 +0,0 @@ -{ - "document_version": 1, - "ip": "192.0.2.10", - "port": 443, - "whois_description": "SOMENET", - "asn": "AS65001", - "asn_country_code": "SE", - "ptr": "host10.test.soc.sunet.se", - "abuse_mail": "abuse@test.soc.sunet.se", - "domain": "sunet.se", - "timestamp": "2021-06-21T14:06:00Z", - "display_name": "Apache 2.1.3", - "description": "The Apache HTTP Server is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0.", - "custom_data": { - "subject_cn": { - "data": "Apache", - "display_name": "Subject Common Name" - }, - "end_of_general_support": { - "data": false, - "display_name": "End of general support", - "description": "Is the software currently supported?" - } - }, - "result": { - "cve_2015_0049": { - "display_name": "CVE-2015-0049", - "vulnerable": false, - "description": "Allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption)." - }, - "cve_2015_0050": { - "display_name": "CVE-2015-0050", - "vulnerable": false - }, - "cve_2015_0060": { - "display_name": "CVE-2015-0060", - "vulnerable": true, - "reliability": 2 - }, - "cve_2015_0063": { - "display_name": "CVE-2015-0063", - "vulnerable": false - }, - "insecure_cryptography": { - "display_name": "Insecure cryptography", - "vulnerable": true, - "reliability": 5, - "description": "Uses RSA instead of elliptic curve." - }, - "possible_webshell": { - "display_name": "Webshells (PST)", - "investigation_needed": true, - "reliability": 1, - "description": "A webshell of type PST was confirmed at /test/webshell.php" - } - } -} |