HelloWorld
HelloWorld Pack.#
This Integration is part of theThis is the Hello World integration for getting started and learn how to build an integration with Cortex XSOAR. You can check the Design Document of this integration here.
Please make sure you look at the integration source code and comments.
This integration was built to interact with the sample SOAR Hello World API To check the API source code go to GitHub.
#
Configure HelloWorld on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for HelloWorld.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Source Reliability Reliability of the source providing the intelligence data. Server URL (e.g. https://soar.monstersofhack.com) True Fetch incidents False Incident type False Maximum number of incidents per fetch False API Key True Score threshold for IP reputation command Set this to determine the HelloWorld score that will determine if an IP is malicious (0-100) False Score threshold for domain reputation command Set this to determine the HelloWorld score that will determine if a domain is malicious (0-100) False Fetch alerts with status (ACTIVE, CLOSED) False Fetch alerts with type Comma-separated list of types of alerts to fetch. Types might change over time. Some examples are 'Bug' and 'Vulnerability' False Minimum severity of alerts to fetch True First fetch time False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
helloworld-say-helloHello command - prints hello to anyone.
#
Base Commandhelloworld-say-hello
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of whom you want to say hello to. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
hello | String | Should be Hello **something** here. |
#
Command Example!helloworld-say-hello name="Hello Dbot"
#
Context Example#
Human Readable Output#
Hello Hello Dbot
#
helloworld-search-alertsSearch HelloWorld Alerts.
#
Base Commandhelloworld-search-alerts
#
InputArgument Name | Description | Required |
---|---|---|
severity | Filter by alert severity. Comma-separated value (Low,Medium,High,Critical) | Optional |
status | Filter by alert status. | Optional |
alert_type | Filter by alert type | Optional |
max_results | Maximum results to return. | Optional |
start_time | Filter by start time. Examples: "3 days ago" "1 month" "2019-10-10T12:22:00" "2019-10-10" | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
HelloWorld.Alert.alert_id | String | Alert ID. |
HelloWorld.Alert.alert_status | String | Alert status. Can be 'ACTIVE' or 'CLOSED'. |
HelloWorld.Alert.alert_type | String | Alert type. For example 'Bug' or 'Vulnerability'. |
HelloWorld.Alert.created | Date | Alert created time. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
HelloWorld.Alert.name | String | Alert name. |
HelloWorld.Alert.severity | String | Alert severity. Can be 'Low', 'Medium', 'High' or 'Critical'. |
#
Command Example!helloworld-search-alerts severity="Critical" start_time="3 days" max_results=2 status="ACTIVE"
#
Context Example#
Human Readable Output#
Results
alert_id alert_status alert_type created name severity 158cfeb2-84bf-498d-a10d-a55c3445d76e ACTIVE Feature 2020-05-06T20:39:07.000Z Hello World Alert of type Feature Critical c61eec7e-3114-46e2-be71-a82572b98fc3 ACTIVE Bug 2020-05-06T07:49:51.000Z Hello World Alert of type Bug Critical
#
helloworld-get-alertRetrieve alert extra data by ID.
#
Base Commandhelloworld-get-alert
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | Alert ID. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
HelloWorld.Alert.alert_id | String | Alert ID. |
HelloWorld.Alert.created | Date | Alert created time. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
HelloWorld.Alert.description | String | Alert description. |
HelloWorld.Alert.device_id | String | ID of the device involved in the alert. |
HelloWorld.Alert.device_ip | String | IP Address of the device involved in the alert. |
HelloWorld.Alert.location | String | Location of the device involved in the alert. |
HelloWorld.Alert.user | String | User involved in the alert. |
#
Command Example!helloworld-get-alert alert_id=695b3238-05d6-4934-86f5-9fff3201aeb0
#
Context Example#
Human Readable Output#
HelloWorld Alert 695b3238-05d6-4934-86f5-9fff3201aeb0
alert_id created description device_id device_ip location user 695b3238-05d6-4934-86f5-9fff3201aeb0 2020-05-08T22:21:01.000Z Your processor has processed too many instructions. Turn it off immediately, do not type any commands!! d3c06d55-0adc-4c60-bf40-8316006ae954 76.224.87.171 Medina Station Sugar Man
#
helloworld-update-alert-statusUpdate the status for an alert.
#
Base Commandhelloworld-update-alert-status
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | Alert ID to update. | Required |
status | New status of the alert. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
HelloWorld.Alert.alert_id | String | Alert ID. |
HelloWorld.Alert.updated | Date | Alert update time. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
HelloWorld.Alert.alert_status | String | Alert status. Can be 'ACTIVE' or 'CLOSED'. |
#
Command Example!helloworld-update-alert-status alert_id=695b3238-05d6-4934-86f5-9fff3201aeb0 status="CLOSED"
#
Context Example#
Human Readable Output#
HelloWorld Alert 695b3238-05d6-4934-86f5-9fff3201aeb0
alert_id alert_status updated 695b3238-05d6-4934-86f5-9fff3201aeb0 CLOSED 2020-05-08T22:21:05.000Z
#
ipReturn IP information and reputation
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | List of IPs. | Optional |
threshold | If the IP has reputation above the threshold then the IP defined as malicious. If threshold not set, then threshold from instance configuration is used. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
HelloWorld.IP.asn | String | The autonomous system name for the IP address. |
HelloWorld.IP.asn_cidr | String | The ASN CIDR. |
HelloWorld.IP.asn_country_code | String | The ASN country code. |
HelloWorld.IP.asn_date | Date | The date on which the ASN was assigned. |
HelloWorld.IP.asn_description | String | The ASN description. |
HelloWorld.IP.asn_registry | String | The registry the ASN belongs to. |
HelloWorld.IP.entities | String | Entities associated to the IP. |
HelloWorld.IP.ip | String | The actual IP address. |
HelloWorld.IP.network.cidr | String | Network CIDR for the IP address. |
HelloWorld.IP.network.country | Unknown | The country of the IP address. |
HelloWorld.IP.network.end_address | String | The last IP address of the CIDR. |
HelloWorld.IP.network.events.action | String | The action that happened on the event. |
HelloWorld.IP.network.events.actor | Unknown | The actor that performed the action on the event. |
HelloWorld.IP.network.events.timestamp | String | The timestamp when the event occurred. |
HelloWorld.IP.network.handle | String | The handle of the network. |
HelloWorld.IP.network.ip_version | String | The IP address version. |
HelloWorld.IP.network.links | String | Links associated to the IP address. |
HelloWorld.IP.network.name | String | The name of the network. |
HelloWorld.IP.network.notices.description | String | The description of the notice. |
HelloWorld.IP.network.notices.links | Unknown | Links associated with the notice. |
HelloWorld.IP.network.notices.title | String | Title of the notice. |
HelloWorld.IP.network.parent_handle | String | Handle of the parent network. |
HelloWorld.IP.network.raw | Unknown | Additional raw data for the network. |
HelloWorld.IP.network.remarks | Unknown | Additional remarks for the network. |
HelloWorld.IP.network.start_address | String | The first IP address of the CIDR. |
HelloWorld.IP.network.status | String | Status of the network. |
HelloWorld.IP.network.type | String | The type of the network. |
HelloWorld.IP.query | String | IP address that was queried. |
HelloWorld.IP.raw | Unknown | Additional raw data for the IP address. |
HelloWorld.IP.score | Number | Reputation score from HelloWorld for this IP (0 to 100, where higher is worse). |
IP.Address | String | IP address. |
IP.Malicious.Vendor | String | The vendor reporting the IP address as malicious. |
IP.Malicious.Description | String | A description explaining why the IP address was reported as malicious. |
IP.ASN | String | The autonomous system name for the IP address. |
IP.Relationships.EntityA | String | The source of the relationship. |
IP.Relationships.EntityB | String | The destination of the relationship. |
IP.Relationships.Relationship | String | The name of the relationship. |
IP.Relationships.EntityAType | String | The type of the source of the relationship. |
IP.Relationships.EntityBType | String | The type of the destination of the relationship. |
#
Command Example!ip ip="8.8.8.8"
#
Context Example#
Human Readable Output#
IP List
asn asn_cidr asn_country_code asn_date asn_description asn_registry entities ip network query raw score 15169 8.8.8.0/24 US 1992-12-01 GOOGLE, US arin GOGL 8.8.8.8 handle: NET-8-8-8-0-1
status: active
remarks: null
notices: {'title': 'Terms of Service', 'description': 'By using the ARIN RDAP/Whois service, you are agreeing to the RDAP/Whois Terms of Use', 'links': ['https://www.arin.net/resources/registry/whois/tou/']},
{'title': 'Whois Inaccuracy Reporting', 'description': 'If you see inaccuracies in the results, please visit: ', 'links': ['https://www.arin.net/resources/registry/whois/inaccuracy_reporting/']},
{'title': 'Copyright Notice', 'description': 'Copyright 1997-2020, American Registry for Internet Numbers, Ltd.', 'links': None}
links: https://rdap.arin.net/registry/ip/8.8.8.0,
https://whois.arin.net/rest/net/NET-8-8-8-0-1,
https://rdap.arin.net/registry/ip/8.0.0.0/9
events: {'action': 'last changed', 'timestamp': '2014-03-14T15:52:05-04:00', 'actor': None},
{'action': 'registration', 'timestamp': '2014-03-14T15:52:05-04:00', 'actor': None}
raw: null
start_address: 8.8.8.0
end_address: 8.8.8.255
cidr: 8.8.8.0/24
ip_version: v4
type: ALLOCATION
name: LVLT-GOGL-8-8-8
country: null
parent_handle: NET-8-0-0-0-18.8.8.8 45
#
domainReturns Domain information and reputation.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | List of Domains. | Optional |
threshold | If the domain has reputation above the threshold then the domain defined as malicious. If threshold not set, then threshold from instance configuration is used. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
Domain.Name | String | The domain name. |
Domain.Malicious.Vendor | String | The vendor reporting the domain as malicious. |
Domain.Malicious.Description | String | A description explaining why the domain was reported as malicious. |
Domain.Registrant.Name | String | The name of the registrant. |
Domain.Registrant.Country | String | The country of the registrant. |
Domain.Organization | String | The organization of the domain. |
Domain.CreationDate | Date | The creation date of the domain. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
Domain.ExpirationDate | Date | The expiration date of the domain. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
Domain.UpdatedDate | Date | The date when the domain was last updated. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
Domain.NameServers | String | Name servers of the domain. |
Domain.WHOIS.NameServers | String | A CSV string of name servers, for example 'ns1.bla.com, ns2.bla.com'. |
Domain.WHOIS.CreationDate | Date | The creation date of the domain. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
Domain.WHOIS.UpdatedDate | Date | The date when the domain was last updated. Format is ISO8601 (i.e. '2020-04-30T10:35:00.000Z'). |
Domain.WHOIS.ExpirationDate | Date | The expiration date of the domain. |
Domain.WHOIS.Registrar.Name | String | The name of the registrar, for example 'GoDaddy' |
IP.ASN | String | The autonomous system name for the IP address. |
HelloWorld.Domain.address | String | Domain admin address. |
HelloWorld.Domain.city | String | Domain admin city. |
HelloWorld.Domain.country | String | Domain admin country. |
HelloWorld.Domain.creation_date | Date | Domain creation date. Format is ISO8601. |
HelloWorld.Domain.dnssec | String | DNSSEC status. |
HelloWorld.Domain.domain | String | The domain name. |
HelloWorld.Domain.domain_name | String | Domain name options. |
HelloWorld.Domain.emails | String | Contact emails. |
HelloWorld.Domain.expiration_date | Date | Expiration date. Format is ISO8601. |
HelloWorld.Domain.name | String | Domain admin name. |
HelloWorld.Domain.name_servers | String | Name server. |
HelloWorld.Domain.org | String | Domain organization. |
HelloWorld.Domain.referral_url | Unknown | Referral URL. |
HelloWorld.Domain.registrar | String | Domain registrar. |
HelloWorld.Domain.score | Number | Reputation score from HelloWorld for this domain (0 to 100, where higher is worse). |
HelloWorld.Domain.state | String | Domain admin state. |
HelloWorld.Domain.status | String | Domain status. |
HelloWorld.Domain.updated_date | Date | Updated date. Format is ISO8601. |
HelloWorld.Domain.whois_server | String | WHOIS server. |
HelloWorld.Domain.zipcode | Unknown | Domain admin zipcode. |
#
Command Example!domain domain="demisto.com"
#
Context Example#
Human Readable Output#
Domain List
address city country creation_date dnssec domain domain_name emails expiration_date name name_servers org referral_url registrar score state status updated_date whois_server zipcode P.O. Box 0823-03411 Panama PA 2015-01-16T21:36:27.000Z unsigned demisto.com DEMISTO.COM,
demisto.comabuse@namecheap.com,
5be9245893ff486d98c3640879bb2657.protect@whoisguard.com2026-01-16T21:36:27.000Z WhoisGuard Protected PNS31.CLOUDNS.NET,
PNS32.CLOUDNS.NET,
PNS33.CLOUDNS.NET,
PNS34.CLOUDNS.NET,
pns31.cloudns.net,
pns32.cloudns.net,
pns33.cloudns.net,
pns34.cloudns.netWhoisGuard, Inc. NAMECHEAP INC 56 Panama clientTransferProhibited https://icann.org/epp#clientTransferProhibited 2019-05-14T16:14:12.000Z whois.namecheap.com
#
helloworld-scan-startStart scan on an asset.
#
Base Commandhelloworld-scan-start
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Asset to start the scan against. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
HelloWorld.Scan.scan_id | string | Unique ID of the scan. |
HelloWorld.Scan.status | string | Status of the scan ('RUNNING' or 'COMPLETE'). |
HelloWorld.Scan.hostname | string | The hostname the scan is run against. |
#
Command Example!helloworld-scan-start hostname="example.com"
#
Context Example#
Human Readable OutputStarted scan 22cc5dba-9e61-42c6-8355-94527b9815c6
#
helloworld-scan-statusRetrieve scan status for one or more scan IDs.
#
Base Commandhelloworld-scan-status
#
InputArgument Name | Description | Required |
---|---|---|
scan_id | List of Scan IDs. helloworld-scan-start returns "scan_id". | Required |
#
Context OutputPath | Type | Description |
---|---|---|
HelloWorld.Scan.scan_id | string | Unique ID of the scan. |
HelloWorld.Scan.status | string | Status of the scan ('RUNNING' or 'COMPLETE'). |
#
Command Example!helloworld-scan-status scan_id="100"
#
Context Example#
Human Readable Output#
Scan status
scan_id status 100 COMPLETE
#
helloworld-scan-resultsRetrieve scan status in Context or as a File (default) for a Scan.
#
Base Commandhelloworld-scan-results
#
InputArgument Name | Description | Required |
---|---|---|
format | Results format (file or JSON). | Required |
scan_id | Unique ID of the scan. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
HelloWorld.Scan.entities.entity-id | String | Scanned entity ID. |
HelloWorld.Scan.entities.ip_address | String | Scanned entity IP address. |
HelloWorld.Scan.entities.type | String | Scanned entity type. |
HelloWorld.Scan.entities.vulnerability_status | String | Scanned entity vulnerability status. |
HelloWorld.Scan.entities.vulns | String | Scanned entity CVE. |
HelloWorld.Scan.scan_id | String | Unique ID of the scan. |
HelloWorld.Scan.status | String | Status of the scan ('RUNNING' or 'COMPLETE'). |
InfoFile.EntryID | Unknown | The EntryID of the report file. |
InfoFile.Extension | string | The extension of the report file. |
InfoFile.Name | string | The name of the report file. |
InfoFile.Info | string | The info of the report file. |
InfoFile.Size | number | The size of the report file. |
InfoFile.Type | string | The type of the report file. |
CVE.ID | string | The ID of the CVE. |
#
Command Example!helloworld-scan-results scan_id=100 format=json
#
Context Example#
Human Readable Output#
Scan 100 results
entity-id ip_address type vulnerability_status vulns 40d6a1cb-9b32-4a93-a0d9-f3eec2e225cb 37.201.236.182 Router NON-SERIOUS CVE-2019-4860,
CVE-2019-19817,
CVE-2019-0819,
CVE-2019-8654f67541a0-d7fe-44d2-8734-b1734ae4e1ab 175.190.247.180 Printer SERIOUS CVE-2019-7974,
CVE-2019-1003074,
CVE-2019-200913ad97b0a-5d91-4dad-b979-e08d3a2d499d 194.17.62.219 Printer NON-SERIOUS CVE-2019-0746 d75c234f-d7e9-464b-ae05-f28e720f8b12 71.122.181.11 HSM NON-SERIOUS CVE-2019-7169,
CVE-2019-6291,
CVE-2019-6335,
CVE-2019-9322,
CVE-2019-17426dcc26c08-b40f-4793-bf85-4c54b64e4e5d 136.144.93.38 Endpoint TRIVIAL CVE-2019-14805,
CVE-2019-1876959e9c5e0-5c0c-493f-8314-ac92318a1462 136.181.109.109 Endpoint NON-SERIOUS CVE-2019-10479,
CVE-2019-13524,
CVE-2019-9580,
CVE-2019-0240,
CVE-2019-6457f403b41b-587e-4293-a802-0bc5ba03a3f2 159.105.212.108 Train TRIVIAL CVE-2019-19592,
CVE-2019-10490,
CVE-2019-0757,
CVE-2019-154856ed7469a-5158-47a5-b17f-8fb721e51227 5.114.109.222 HSM NON-SERIOUS CVE-2019-9375,
CVE-2019-18671,
CVE-2019-13301,
CVE-2019-16205,
CVE-2019-8994ab35bd99-44f9-4096-a9ae-adca874f90e2 172.60.9.133 Train SERIOUS CVE-2019-0734,
CVE-2019-16177,
CVE-2019-10763,
CVE-2019-18241,
CVE-2019-154729500171c-1d82-4df0-9e55-8211925a7366 111.30.110.70 Fridge SERIOUS CVE-2019-11163 795ca8b4-32ad-4ba9-b578-7ac7e35b2a81 97.213.154.249 Gate SERIOUS CVE-2019-7940,
CVE-2019-22577cf5d465-c9e1-48ca-b952-3d287cce5aba 127.96.3.67 Fan NON-SERIOUS CVE-2019-5084,
CVE-2019-0667,
CVE-2019-15497,
CVE-2019-08878d425bf0-e3e8-49fd-89e1-e918d3e1f9f4 209.109.7.246 Gate SERIOUS CVE-2019-9792,
CVE-2019-18250,
CVE-2019-17399,
CVE-2019-12978c80278a6-70af-40a9-9914-535f9efba725 135.209.178.232 Gate TRIVIAL CVE-2019-8029 2d926b20-6b7d-4a3d-85c7-3edded7ef5a7 203.69.245.105 HSM NON-SERIOUS CVE-2019-1732 3e7b9099-b86d-43b8-897e-84dbabb2e656 131.97.249.220 Fridge NON-SERIOUS CVE-2019-12762,
CVE-2019-13507,
CVE-2019-16792,
CVE-2019-10492ef31a797-f340-4421-96ae-966d880463f6 5.115.147.13 IoT Device TRIVIAL CVE-2019-9974,
CVE-2019-10956,
CVE-2019-87484c5ce6a4-be8c-4341-b09c-075f2285c18e 77.178.129.200 Fridge TRIVIAL CVE-2019-13100,
CVE-2019-20443,
CVE-2019-1052870fe2247-50e6-463b-8f65-bea4916cac67 159.58.108.231 Train TRIVIAL CVE-2019-15233 fa8fcd0c-6862-46d7-b649-488c56509822 172.71.119.38 Train SERIOUS CVE-2019-12611,
CVE-2019-14357,
CVE-2019-5579,
CVE-2019-204249ca55748-cba2-469c-a468-73666f5a182a 137.39.150.42 Mainframe TRIVIAL CVE-2019-5632,
CVE-2019-90258fef9722-d627-4737-81b9-f1454032b640 254.143.245.36 Train NON-SERIOUS CVE-2019-19532,
CVE-2019-10311,
CVE-2019-9578146685d1-9899-425d-b2f0-fa082fbab0a9 132.172.112.36 Train TRIVIAL CVE-2019-7711,
CVE-2019-10481,
CVE-2019-1959b0a94cfd-574d-468f-8f82-10dc3fe00ff8 139.166.107.214 IoT Device TRIVIAL CVE-2019-11331 bb76f8cf-d264-42ce-bf47-c61da8324a43 45.174.165.64 Printer SERIOUS CVE-2019-5095,
CVE-2019-2658,
CVE-2019-15593,
CVE-2019-16320,
CVE-2019-11213ec6ad2df-37ce-4eed-ba3e-1507ff7d975a 99.120.52.25 Router NON-SERIOUS CVE-2019-5114,
CVE-2019-914785273e98-e070-42e0-9b4e-3cefa15fffac 254.186.92.211 IoT Device TRIVIAL CVE-2019-17342,
CVE-2019-17269,
CVE-2019-6273,
CVE-2019-5880,
CVE-2019-936805b53757-7155-4a5f-b047-b968e6ca2dec 119.78.96.64 Router SERIOUS CVE-2019-16237 ec8e0a9b-9321-4bc0-9247-c10808686fa8 81.119.103.180 Server TRIVIAL CVE-2019-5252,
CVE-2019-15124f3121a8-de72-42ad-b490-10b307e0c553 201.145.25.59 Train TRIVIAL CVE-2019-1728,
CVE-2019-2946df439f01-59b2-4fc7-9356-a845534158e2 108.94.125.170 Endpoint NON-SERIOUS CVE-2019-15064,
CVE-2019-19767,
CVE-2019-2239,
CVE-2019-29235082677b-eb00-4724-b2d6-f64010a85e60 162.183.92.207 HSM NON-SERIOUS CVE-2019-16534,
CVE-2019-5250,
CVE-2019-11632,
CVE-2019-11971,
CVE-2019-4811a10f4a77-45ea-4213-979a-3031835d75f6 77.165.85.252 Fan SERIOUS CVE-2019-1716,
CVE-2019-10401,
CVE-2019-0335636e3504-5a6b-404c-96e2-c5bd9524a4d5 145.132.60.210 HSM SERIOUS CVE-2019-3420,
CVE-2019-5763,
CVE-2019-0200,
CVE-2019-5989,
CVE-2019-121626851f735-5d3b-434a-978e-97536317def7 153.44.130.204 IoT Device SERIOUS CVE-2019-13339,
CVE-2019-4038,
CVE-2019-485656936e07-bc42-48cb-9aa8-2aa6c4b22ddc 191.18.113.68 IoT Device TRIVIAL CVE-2019-8139,
CVE-2019-5450a2fbc2d1-e76e-4245-b9c2-74c12e1d4d38 180.247.251.51 Endpoint TRIVIAL CVE-2019-3735,
CVE-2019-5789,
CVE-2019-2128,
CVE-2019-5279e1383013-9086-433b-a8a7-8b67b221b082 217.31.78.215 Smart Beer TRIVIAL CVE-2019-2889,
CVE-2019-9114e961ac9c-b0f2-49ec-8193-7a1ae8e3f038 43.219.254.133 IoT Device SERIOUS CVE-2019-9624,
CVE-2019-018688e31eb7-49b7-4870-bb17-d31a290ecadb 74.155.134.147 HSM TRIVIAL CVE-2019-4139,
CVE-2019-7081,
CVE-2019-1787,
CVE-2019-1882412ce3171-49f1-4ee6-ac94-ef2c141f23ed 188.186.34.143 Endpoint NON-SERIOUS CVE-2019-8926,
CVE-2019-6579,
CVE-2019-7390,
CVE-2019-2610