summaryrefslogtreecommitdiff
path: root/data/example_data_3_replace_test.json
diff options
context:
space:
mode:
Diffstat (limited to 'data/example_data_3_replace_test.json')
-rw-r--r--data/example_data_3_replace_test.json52
1 files changed, 0 insertions, 52 deletions
diff --git a/data/example_data_3_replace_test.json b/data/example_data_3_replace_test.json
deleted file mode 100644
index 31cc64d..0000000
--- a/data/example_data_3_replace_test.json
+++ /dev/null
@@ -1,52 +0,0 @@
-{
- "_id": "6370498050845fac09e0fc01",
- "document_version": 2,
- "ip": "192.0.2.28",
- "port": 112,
- "whois_description": "SOMENET",
- "asn": "AS65001",
- "asn_country_code": "SE",
- "ptr": "host111.test.soc.sunet.se",
- "abuse_mail": "abuse@test.soc.sunet.se",
- "domain": "sunet.se",
- "timestamp": "2021-06-30T15:00:00Z",
- "display_name": "VMware ESXi 6.7.0 build-17700523",
- "description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.",
- "custom_data": {
- "subject_cn": {
- "data": "VMware ESXi",
- "display_name": "Subject Common Name"
- },
- "end_of_general_support": {
- "data": true,
- "display_name": "End of general support",
- "description": "Is the software currently supported?"
- }
- },
- "result": {
- "cve_2019_0001": {
- "display_name": "CVE-2019-0001",
- "vulnerable": false
- },
- "cve_2015_0002": {
- "display_name": "CVE-2015-0002",
- "vulnerable": false,
- "description": "There is a use of insufficiently random values vulnerability. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak."
- },
- "cve_2015_0003": {
- "display_name": "CVE-2015-0003",
- "vulnerable": true,
- "reliability": 2,
- "description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash."
- },
- "cve_2015_0004": {
- "display_name": "CVE-2015-0004",
- "vulnerable": false
- },
- "cve_2015_0005": {
- "display_name": "CVE-2015-0005",
- "vulnerable": true,
- "reliability": 4
- }
- }
-}