{ "document_version": 1, "ip": "192.0.2.20", "port": 80, "whois_description": "SOMENET", "asn": "AS65001", "asn_country_code": "SE", "ptr": "host11.test.soc.sunet.se", "abuse_mail": "abuse@test.soc.sunet.se", "domain": "sunet.se", "timestamp": "2021-06-30T10:00:00Z", "display_name": "VMware ESXi 6.7.0 build-17700523", "description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.", "custom_data": { "subject_cn": { "data": "VMware ESXi", "display_name": "Subject Common Name" }, "end_of_general_support": { "data": true, "display_name": "End of general support", "description": "Is the software currently supported?" } }, "result": { "cve_2019_0001": { "display_name": "CVE-2019-0001", "vulnerable": false }, "cve_2015_0002": { "display_name": "CVE-2015-0002", "vulnerable": false, "description": "There is a use of insufficiently random values vulnerability. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak." }, "cve_2015_0003": { "display_name": "CVE-2015-0003", "vulnerable": true, "reliability": 2, "description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash." }, "cve_2015_0004": { "display_name": "CVE-2015-0004", "vulnerable": false }, "cve_2015_0005": { "display_name": "CVE-2015-0005", "vulnerable": true, "reliability": 4 } } }