MISP-Taxii-Server/tests/cve-in-exploit-target.xml

26 lines
1.2 KiB
XML
Raw Normal View History

Squashed commit of the following: commit 3389560fe994c7c17d678c695128fe90824634d6 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Sat Nov 19 15:38:11 2016 +0000 Removed unicode things commit 060f94f565caad28ea66b9a3826b84476dac8b92 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 16:10:28 2016 +0000 Apparently output goes to stderr? commit b41109dd9e2d8df943e40a46153bc8c4e5bd971b Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 16:01:39 2016 +0000 127 not localhost? commit 77c45273b0755c2c16e85936ca2b76b249cc95d9 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:54:12 2016 +0000 Allow server time to start up commit ee06ff076542d269468db5cc7cd2f9f157af16eb Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:48:38 2016 +0000 sudo sudo commit 9f0f31c0234a3c226e7d8ecdd7d9f95afcc77f60 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:47:45 2016 +0000 Move sql install to before_install commit 51b49dc1760643efe3a01756cfdca7fdb335be8e Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:46:02 2016 +0000 Fixed a typo commit 2b90620b4cb0d319dfebe8415d7a4fd0e75f2bf3 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:45:10 2016 +0000 Mysql pls commit 7f4e2b9f6213dd0a39ef38754c3aa6b19a2432aa Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:42:32 2016 +0000 Switch to trusty travis commit 64e39b798347740cd4700f6a2ac0dd9589a87ac1 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:35:31 2016 +0000 Switch to trusty travis commit 44685648608a04cba1b933479654159d4bf804ac Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:30:30 2016 +0000 Stop being a tard commit 0a9f534fa71bce3625c39f6cb28c294a57406806 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:28:04 2016 +0000 Check mysql version commit 887a6d82a7f8fc243f8d0740e97fbf85cb3c3c29 Author: Hannah Ward <Hannah.ward9001@gmail.com> Date: Fri Nov 18 15:17:26 2016 +0000 Print a bit of debug info
2016-11-19 16:42:54 +01:00
<?xml version="1.0" ?>
2016-11-18 14:51:01 +01:00
<stix:STIX_Package
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:stix="http://stix.mitre.org/stix-1"
xmlns:stixCommon="http://stix.mitre.org/common-1"
xmlns:et="http://stix.mitre.org/ExploitTarget-1"
xmlns:stixVocabs="http://stix.mitre.org/default_vocabularies-1"
xmlns:example="http://example.com/"
xsi:schemaLocation="
http://stix.mitre.org/stix-1 http://stix.mitre.org/XMLSchema/core/1.2/stix_core.xsd
http://stix.mitre.org/ExploitTarget-1 http://stix.mitre.org/XMLSchema/exploit_target/1.2/exploit_target.xsd
http://stix.mitre.org/default_vocabularies-1 http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd"
id="example:STIXPackage-0196d980-60d9-4717-b7c5-bf7bc27a35d4"
version="1.2"
>
<stix:Exploit_Targets>
<stixCommon:Exploit_Target xsi:type="et:ExploitTargetType" id="example:et-48a276f7-a8d7-bba2-3575-e8a63fcd488" timestamp="2014-05-08T09:00:00.000000Z">
<et:Title>Javascript vulnerability in MSIE 6-11</et:Title>
<et:Vulnerability>
<et:CVE_ID>CVE-2013-3893</et:CVE_ID>
</et:Vulnerability>
</stixCommon:Exploit_Target>
</stix:Exploit_Targets>
</stix:STIX_Package>