summaryrefslogtreecommitdiff
path: root/example_data_2.json
diff options
context:
space:
mode:
Diffstat (limited to 'example_data_2.json')
-rw-r--r--example_data_2.json32
1 files changed, 18 insertions, 14 deletions
diff --git a/example_data_2.json b/example_data_2.json
index cc930a0..f4083b1 100644
--- a/example_data_2.json
+++ b/example_data_2.json
@@ -10,28 +10,32 @@
"domain": "sunet.se",
"timestamp_in_utc": "2021-06-30T10:00 UTC",
"system_name": "VMware ESXi 6.7.0 build-17700523",
- "result": [
- {
+ "result": {
+ "cve_2019_0001": {
"cve": "CVE-2019-0001",
"vulnerable": false
},
- {
- "cve": "CVE-2015-0002",
- "vulnerable": false
+ "cve_2015_0002": {
+ "display_name": "CVE-2015-0002",
+ "vulnerable": false,
+ "description": "There is a use of insufficiently random values vulnerability. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak."
},
- {
- "cve": "CVE-2015-0003",
- "vulnerable": true
+ "cve_2015_0003": {
+ "display_name": "CVE-2015-0003",
+ "vulnerable": true,
+ "reliability": 2,
+ "description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash."
},
- {
- "cve": "CVE-2015-0004",
+ "cve_2015_0004": {
+ "display_name": "CVE-2015-0004",
"vulnerable": false
},
- {
- "cve": "CVE-2015-0005",
- "vulnerable": true
+ "cve_2015_0005": {
+ "display_name": "CVE-2015-0005",
+ "vulnerable": true,
+ "reliability": 4
}
- ],
+ },
"description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.",
"custom_data": {
"subject_cn": {