forked from seven6306/Python
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsample.txt
1 lines (1 loc) · 1.47 KB
/
sample.txt
1
{"status":"up","scan_duration":1,"vulnerabilities_details":[{"id":"YM_ROUTER_CVE-2011-4723","is_vuln":false,"risk_level":"medium","cvss":6.8,"services":[{"error_code":0,"error_msg":"","is_vuln":false,"conf":10,"port":80,"name":"http"}]},{"id":"YM_DROWN_CVE-2016-0800","is_vuln":true,"risk_level":"medium","cvss":4.3,"services":[{"error_code":0,"error_msg":"","is_vuln":true,"conf":10,"port":443,"name":"https"}]},{"id":"YM_POODLE_CVE-2014-3566","is_vuln":true,"risk_level":"medium","cvss":4.3,"services":[{"error_code":0,"error_msg":"","is_vuln":true,"conf":10,"port":443,"name":"https"}]},{"id":"YM_SHELLSHOCK_CVE-2014-6271","is_vuln":false,"risk_level":"high","cvss":10,"services":[{"error_code":0,"error_msg":"","is_vuln":false,"conf":10,"port":443,"name":"https"}]},{"id":"YM_HEARTBLEED_CVE-2014-0160","is_vuln":true,"risk_level":"medium","cvss":5,"services":[{"error_code":0,"error_msg":"","is_vuln":true,"conf":10,"port":443,"name":"https"}]}],"vulnerabilities_found":true,"open_ports":[{"protocol":"tcp","port":22,"state":"open","reason":"syn-ack","service":{"name":"ssh","method":"table","conf":3},"isc":{"error_code":0,"error_msg":""}},{"protocol":"tcp","port":80,"state":"open","reason":"syn-ack","service":{"name":"http","method":"table","conf":3},"isc":{"error_code":0,"error_msg":""}},{"protocol":"tcp","port":443,"state":"open","reason":"syn-ack","service":{"name":"https","method":"table","conf":3},"isc":{"error_code":0,"error_msg":""}}],"ipv4":"192.168.2.126","mac":"00:0C:29:8A:FC:9E"