diff options
-rw-r--r-- | example_data_1.json | 51 | ||||
-rw-r--r-- | example_data_2.json | 51 |
2 files changed, 0 insertions, 102 deletions
diff --git a/example_data_1.json b/example_data_1.json deleted file mode 100644 index 3b64472..0000000 --- a/example_data_1.json +++ /dev/null @@ -1,51 +0,0 @@ -{ - "document_version": 1, - "ip": "192.0.2.10", - "port": 443, - "whois_description": "SOMENET", - "asn": "AS65001", - "asn_country_code": "SE", - "ptr": "host10.test.soc.sunet.se", - "abuse_mail": "abuse@test.soc.sunet.se", - "domain": "sunet.se", - "timestamp_in_utc": "2021-06-21T14:06 UTC", - "system_name": "Apache 2.1.3", - "description": "The Apache HTTP Server is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0.", - "custom_data": { - "subject_cn": { - "data": "Apache", - "display_name": "Subject Common Name" - }, - "end_of_general_support": { - "data": false, - "display_name": "End of general support", - "description": "Is the software currently supported?" - } - }, - "result": { - "cve_2015_0049": { - "display_name": "CVE-2015-0049", - "vulnerable": false, - "description": "Allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption)." - }, - "cve_2015_0050": { - "display_name": "CVE-2015-0050", - "vulnerable": false - }, - "cve_2015_0060": { - "display_name": "CVE-2015-0060", - "vulnerable": true, - "reliability": 2 - }, - "cve_2015_0063": { - "display_name": "CVE-2015-0063", - "vulnerable": false - }, - "insecure_cryptography": { - "display_name": "Insecure cryptography", - "vulnerable": true, - "reliability": 5, - "description": "Uses RSA instead of elliptic curve." - } - } -} diff --git a/example_data_2.json b/example_data_2.json deleted file mode 100644 index e73d2b5..0000000 --- a/example_data_2.json +++ /dev/null @@ -1,51 +0,0 @@ -{ - "document_version": 1, - "ip": "192.0.2.20", - "port": 80, - "whois_description": "SOMENET", - "asn": "AS65001", - "asn_country_code": "SE", - "ptr": "host11.test.soc.sunet.se", - "abuse_mail": "abuse@test.soc.sunet.se", - "domain": "sunet.se", - "timestamp_in_utc": "2021-06-30T10:00 UTC", - "system_name": "VMware ESXi 6.7.0 build-17700523", - "description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.", - "custom_data": { - "subject_cn": { - "data": "VMware ESXi", - "display_name": "Subject Common Name" - }, - "end_of_general_support": { - "data": true, - "display_name": "End of general support", - "description": "Is the software currently supported?" - } - }, - "result": { - "cve_2019_0001": { - "cve": "CVE-2019-0001", - "vulnerable": false - }, - "cve_2015_0002": { - "display_name": "CVE-2015-0002", - "vulnerable": false, - "description": "There is a use of insufficiently random values vulnerability. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak." - }, - "cve_2015_0003": { - "display_name": "CVE-2015-0003", - "vulnerable": true, - "reliability": 2, - "description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash." - }, - "cve_2015_0004": { - "display_name": "CVE-2015-0004", - "vulnerable": false - }, - "cve_2015_0005": { - "display_name": "CVE-2015-0005", - "vulnerable": true, - "reliability": 4 - } - } -} |