Commit ·
babcf68
1
Parent(s): d5aaedc
Remove train folder
Browse files- Train/SEPSES_CTA_ground_truth.csv +0 -2004
- Train/tables/table1.csv +0 -0
Train/SEPSES_CTA_ground_truth.csv
DELETED
|
@@ -1,2004 +0,0 @@
|
|
| 1 |
-
table_name,column_id,label
|
| 2 |
-
table1,0,http://w3id.org/sepses/vocab/ref/cwe#CWE
|
| 3 |
-
table1,1,http://w3id.org/sepses/vocab/ref/cwe#CWE
|
| 4 |
-
table1,2,NULL
|
| 5 |
-
table1,3,NULL
|
| 6 |
-
table1,4,NULL
|
| 7 |
-
table1,5,NULL
|
| 8 |
-
table1,6,http://w3id.org/sepses/vocab/ref/cwe#RelatedWeakness
|
| 9 |
-
table1,7,NULL
|
| 10 |
-
table1,8,http://w3id.org/sepses/vocab/ref/cwe#AplicablePlatform
|
| 11 |
-
table1,9,NULL
|
| 12 |
-
table1,10,NULL
|
| 13 |
-
table1,11,http://w3id.org/sepses/vocab/ref/cwe#ModeOfIntroduction
|
| 14 |
-
table1,12,NULL
|
| 15 |
-
table1,13,NULL
|
| 16 |
-
table1,14,http://w3id.org/sepses/vocab/ref/cwe#CommonConsequence
|
| 17 |
-
table1,15,http://w3id.org/sepses/vocab/ref/cwe#DetectionMethod
|
| 18 |
-
table1,16,http://w3id.org/sepses/vocab/ref/cwe#PotentialMitigation
|
| 19 |
-
table1,17,http://w3id.org/sepses/vocab/ref/cwe#Reference
|
| 20 |
-
table1,18,NULL
|
| 21 |
-
table1,19,NULL
|
| 22 |
-
table1,20,NULL
|
| 23 |
-
table1,21,http://w3id.org/sepses/vocab/ref/capec#CAPEC
|
| 24 |
-
table1,22,NULL
|
| 25 |
-
table107,0,http://w3id.org/sepses/resource/cve#CVE
|
| 26 |
-
table107,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 27 |
-
table107,2,NULL
|
| 28 |
-
table107,3,http://w3id.org/sepses/resource/cve#Reference
|
| 29 |
-
table107,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 30 |
-
table108,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 31 |
-
table108,1,NULL
|
| 32 |
-
table110,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 33 |
-
table110,1,NULL
|
| 34 |
-
table113,0,http://w3id.org/sepses/resource/cve#CVE
|
| 35 |
-
table113,1,NULL
|
| 36 |
-
table113,2,NULL
|
| 37 |
-
table113,3,http://w3id.org/sepses/resource/cpe#Product
|
| 38 |
-
table113,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 39 |
-
table113,5,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 40 |
-
table116,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 41 |
-
table116,1,http://w3id.org/sepses/resource/capec#Mitigations
|
| 42 |
-
table116,2,NULL
|
| 43 |
-
table116,3,NULL
|
| 44 |
-
table116,4,NULL
|
| 45 |
-
table116,5,NULL
|
| 46 |
-
table12,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 47 |
-
table12,1,http://w3id.org/sepses/resource/cwe#Reference
|
| 48 |
-
table12,2,NULL
|
| 49 |
-
table12,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 50 |
-
table12,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 51 |
-
table122,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 52 |
-
table122,1,NULL
|
| 53 |
-
table122,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 54 |
-
table122,3,http://w3id.org/sepses/resource/cpe#productName
|
| 55 |
-
table123,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 56 |
-
table123,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 57 |
-
table123,2,http://w3id.org/sepses/resource/cpe#productName
|
| 58 |
-
table123,3,NULL
|
| 59 |
-
table123,4,NULL
|
| 60 |
-
table123,5,NULL
|
| 61 |
-
table123,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 62 |
-
table123,7,http://w3id.org/sepses/resource/cpe#Product
|
| 63 |
-
table123,8,NULL
|
| 64 |
-
table126,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 65 |
-
table126,1,NULL
|
| 66 |
-
table126,2,NULL
|
| 67 |
-
table126,3,NULL
|
| 68 |
-
table126,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 69 |
-
table126,5,NULL
|
| 70 |
-
table128,0,http://w3id.org/sepses/resource/cve#CVE
|
| 71 |
-
table128,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 72 |
-
table128,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 73 |
-
table128,3,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 74 |
-
table128,4,NULL
|
| 75 |
-
table130,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 76 |
-
table130,1,NULL
|
| 77 |
-
table130,2,NULL
|
| 78 |
-
table130,3,NULL
|
| 79 |
-
table130,4,NULL
|
| 80 |
-
table130,5,http://w3id.org/sepses/resource/cwe#Reference
|
| 81 |
-
table130,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 82 |
-
table130,7,NULL
|
| 83 |
-
table130,8,NULL
|
| 84 |
-
table130,9,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 85 |
-
table130,10,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 86 |
-
table130,11,NULL
|
| 87 |
-
table130,12,NULL
|
| 88 |
-
table132,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 89 |
-
table132,1,http://w3id.org/sepses/resource/cpe#Product
|
| 90 |
-
table132,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 91 |
-
table132,3,NULL
|
| 92 |
-
table132,4,NULL
|
| 93 |
-
table134,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 94 |
-
table134,1,NULL
|
| 95 |
-
table134,2,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 96 |
-
table134,3,http://w3id.org/sepses/resource/capec#CAPEC
|
| 97 |
-
table134,4,http://w3id.org/sepses/resource/capec#Consequences
|
| 98 |
-
table134,5,http://w3id.org/sepses/resource/cwe#CWE
|
| 99 |
-
table134,6,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 100 |
-
table138,0,http://w3id.org/sepses/resource/cve#CVE
|
| 101 |
-
table138,1,NULL
|
| 102 |
-
table138,2,NULL
|
| 103 |
-
table138,3,http://w3id.org/sepses/resource/cve#Reference
|
| 104 |
-
table138,4,NULL
|
| 105 |
-
table138,5,NULL
|
| 106 |
-
table138,6,NULL
|
| 107 |
-
table140,0,http://w3id.org/sepses/resource/cve#CVE
|
| 108 |
-
table140,1,http://w3id.org/sepses/resource/cpe#vendorName
|
| 109 |
-
table146,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 110 |
-
table146,1,NULL
|
| 111 |
-
table146,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 112 |
-
table149,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 113 |
-
table149,1,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 114 |
-
table149,2,http://w3id.org/sepses/resource/capec#Mitigations
|
| 115 |
-
table149,3,http://w3id.org/sepses/resource/capec#Consequences
|
| 116 |
-
table149,4,NULL
|
| 117 |
-
table149,5,NULL
|
| 118 |
-
table149,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 119 |
-
table149,7,NULL
|
| 120 |
-
table149,8,http://w3id.org/sepses/resource/cwe#CWE
|
| 121 |
-
table15,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 122 |
-
table15,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 123 |
-
table15,2,http://w3id.org/sepses/resource/cpe#productName
|
| 124 |
-
table15,3,NULL
|
| 125 |
-
table15,4,NULL
|
| 126 |
-
table15,5,NULL
|
| 127 |
-
table15,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 128 |
-
table15,7,http://w3id.org/sepses/resource/cpe#Product
|
| 129 |
-
table15,8,NULL
|
| 130 |
-
table151,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 131 |
-
table151,1,NULL
|
| 132 |
-
table151,2,NULL
|
| 133 |
-
table151,3,NULL
|
| 134 |
-
table151,4,NULL
|
| 135 |
-
table151,5,NULL
|
| 136 |
-
table151,6,NULL
|
| 137 |
-
table151,7,NULL
|
| 138 |
-
table151,8,NULL
|
| 139 |
-
table151,9,http://w3id.org/sepses/resource/capec#CAPEC
|
| 140 |
-
table151,10,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 141 |
-
table152,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 142 |
-
table152,1,NULL
|
| 143 |
-
table152,2,NULL
|
| 144 |
-
table152,3,NULL
|
| 145 |
-
table153,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 146 |
-
table153,1,NULL
|
| 147 |
-
table159,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 148 |
-
table159,1,NULL
|
| 149 |
-
table160,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 150 |
-
table160,1,NULL
|
| 151 |
-
table160,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 152 |
-
table160,3,NULL
|
| 153 |
-
table160,4,NULL
|
| 154 |
-
table160,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 155 |
-
table160,6,NULL
|
| 156 |
-
table160,7,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 157 |
-
table160,8,NULL
|
| 158 |
-
table160,9,NULL
|
| 159 |
-
table162,0,http://w3id.org/sepses/resource/cve#CVE
|
| 160 |
-
table162,1,http://w3id.org/sepses/resource/cpe#Product
|
| 161 |
-
table162,2,http://w3id.org/sepses/resource/capec#CAPEC
|
| 162 |
-
table162,3,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 163 |
-
table162,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 164 |
-
table164,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 165 |
-
table164,1,NULL
|
| 166 |
-
table164,2,http://w3id.org/sepses/resource/cpe#Product
|
| 167 |
-
table164,3,NULL
|
| 168 |
-
table164,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 169 |
-
table164,5,http://w3id.org/sepses/resource/cpe#productName
|
| 170 |
-
table168,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 171 |
-
table168,1,NULL
|
| 172 |
-
table168,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 173 |
-
table168,3,http://w3id.org/sepses/resource/cpe#productName
|
| 174 |
-
table171,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 175 |
-
table171,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 176 |
-
table171,2,NULL
|
| 177 |
-
table171,3,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 178 |
-
table171,4,NULL
|
| 179 |
-
table171,5,NULL
|
| 180 |
-
table172,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 181 |
-
table172,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 182 |
-
table174,0,http://w3id.org/sepses/resource/cve#CVE
|
| 183 |
-
table174,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 184 |
-
table174,2,NULL
|
| 185 |
-
table174,3,NULL
|
| 186 |
-
table174,4,NULL
|
| 187 |
-
table176,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 188 |
-
table176,1,NULL
|
| 189 |
-
table176,2,NULL
|
| 190 |
-
table176,3,NULL
|
| 191 |
-
table176,4,http://w3id.org/sepses/resource/capec#CAPEC
|
| 192 |
-
table176,5,http://w3id.org/sepses/resource/capec#Mitigations
|
| 193 |
-
table176,6,NULL
|
| 194 |
-
table176,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 195 |
-
table176,8,NULL
|
| 196 |
-
table176,9,http://w3id.org/sepses/resource/capec#Consequences
|
| 197 |
-
table178,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 198 |
-
table178,1,NULL
|
| 199 |
-
table178,2,NULL
|
| 200 |
-
table178,3,NULL
|
| 201 |
-
table178,4,NULL
|
| 202 |
-
table178,5,NULL
|
| 203 |
-
table178,6,NULL
|
| 204 |
-
table178,7,http://w3id.org/sepses/resource/cwe#CWE
|
| 205 |
-
table178,8,NULL
|
| 206 |
-
table178,9,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 207 |
-
table178,10,http://w3id.org/sepses/resource/cwe#Reference
|
| 208 |
-
table18,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 209 |
-
table18,1,NULL
|
| 210 |
-
table18,2,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 211 |
-
table18,3,NULL
|
| 212 |
-
table18,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 213 |
-
table18,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 214 |
-
table18,6,NULL
|
| 215 |
-
table18,7,NULL
|
| 216 |
-
table18,8,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 217 |
-
table182,0,http://w3id.org/sepses/resource/cve#CVE
|
| 218 |
-
table182,1,NULL
|
| 219 |
-
table185,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 220 |
-
table185,1,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 221 |
-
table185,2,NULL
|
| 222 |
-
table185,3,NULL
|
| 223 |
-
table185,4,NULL
|
| 224 |
-
table186,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 225 |
-
table186,1,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 226 |
-
table186,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 227 |
-
table186,3,http://w3id.org/sepses/resource/capec#CAPEC
|
| 228 |
-
table186,4,http://w3id.org/sepses/resource/cwe#Reference
|
| 229 |
-
table186,5,NULL
|
| 230 |
-
table186,6,NULL
|
| 231 |
-
table186,7,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 232 |
-
table186,8,NULL
|
| 233 |
-
table189,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 234 |
-
table189,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 235 |
-
table189,2,NULL
|
| 236 |
-
table189,3,NULL
|
| 237 |
-
table189,4,NULL
|
| 238 |
-
table189,5,NULL
|
| 239 |
-
table189,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 240 |
-
table189,7,NULL
|
| 241 |
-
table19,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 242 |
-
table19,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 243 |
-
table19,2,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 244 |
-
table19,3,NULL
|
| 245 |
-
table19,4,NULL
|
| 246 |
-
table19,5,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 247 |
-
table19,6,NULL
|
| 248 |
-
table19,7,NULL
|
| 249 |
-
table19,8,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 250 |
-
table19,9,http://w3id.org/sepses/resource/capec#Consequences
|
| 251 |
-
table19,10,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 252 |
-
table190,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 253 |
-
table190,1,http://w3id.org/sepses/resource/cpe#Product
|
| 254 |
-
table190,2,http://w3id.org/sepses/resource/cpe#productName
|
| 255 |
-
table190,3,NULL
|
| 256 |
-
table190,4,NULL
|
| 257 |
-
table191,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 258 |
-
table191,1,NULL
|
| 259 |
-
table191,2,NULL
|
| 260 |
-
table191,3,http://w3id.org/sepses/resource/cwe#Reference
|
| 261 |
-
table191,4,NULL
|
| 262 |
-
table191,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 263 |
-
table192,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 264 |
-
table192,1,NULL
|
| 265 |
-
table192,2,NULL
|
| 266 |
-
table192,3,NULL
|
| 267 |
-
table192,4,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 268 |
-
table192,5,NULL
|
| 269 |
-
table192,6,http://w3id.org/sepses/resource/cwe#Reference
|
| 270 |
-
table192,7,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 271 |
-
table192,8,NULL
|
| 272 |
-
table192,9,http://w3id.org/sepses/resource/cwe#CWE
|
| 273 |
-
table192,10,NULL
|
| 274 |
-
table192,11,NULL
|
| 275 |
-
table193,0,http://w3id.org/sepses/resource/cve#CVE
|
| 276 |
-
table193,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 277 |
-
table193,2,http://w3id.org/sepses/resource/capec#CAPEC
|
| 278 |
-
table194,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 279 |
-
table194,1,NULL
|
| 280 |
-
table194,2,NULL
|
| 281 |
-
table194,3,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 282 |
-
table194,4,http://w3id.org/sepses/resource/capec#Consequences
|
| 283 |
-
table194,5,NULL
|
| 284 |
-
table194,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 285 |
-
table194,7,http://w3id.org/sepses/resource/capec#Mitigations
|
| 286 |
-
table194,8,http://w3id.org/sepses/resource/capec#CAPEC
|
| 287 |
-
table194,9,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 288 |
-
table195,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 289 |
-
table195,1,NULL
|
| 290 |
-
table196,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 291 |
-
table196,1,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 292 |
-
table196,2,NULL
|
| 293 |
-
table196,3,NULL
|
| 294 |
-
table196,4,NULL
|
| 295 |
-
table196,5,NULL
|
| 296 |
-
table196,6,NULL
|
| 297 |
-
table198,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 298 |
-
table198,1,NULL
|
| 299 |
-
table198,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 300 |
-
table198,3,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 301 |
-
table198,4,NULL
|
| 302 |
-
table198,5,http://w3id.org/sepses/resource/cwe#Reference
|
| 303 |
-
table198,6,NULL
|
| 304 |
-
table198,7,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 305 |
-
table198,8,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 306 |
-
table198,9,NULL
|
| 307 |
-
table198,10,NULL
|
| 308 |
-
table198,11,NULL
|
| 309 |
-
table20,0,http://w3id.org/sepses/resource/cve#CVE
|
| 310 |
-
table20,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 311 |
-
table200,0,http://w3id.org/sepses/resource/cve#CVE
|
| 312 |
-
table200,1,NULL
|
| 313 |
-
table200,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 314 |
-
table200,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 315 |
-
table200,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 316 |
-
table200,5,http://w3id.org/sepses/resource/cpe#Product
|
| 317 |
-
table200,6,NULL
|
| 318 |
-
table200,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 319 |
-
table200,8,NULL
|
| 320 |
-
table200,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 321 |
-
table200,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 322 |
-
table200,11,http://w3id.org/sepses/resource/cve#Reference
|
| 323 |
-
table203,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 324 |
-
table203,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 325 |
-
table203,2,NULL
|
| 326 |
-
table203,3,NULL
|
| 327 |
-
table203,4,NULL
|
| 328 |
-
table203,5,http://w3id.org/sepses/resource/capec#Mitigations
|
| 329 |
-
table203,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 330 |
-
table203,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 331 |
-
table203,8,NULL
|
| 332 |
-
table203,9,NULL
|
| 333 |
-
table203,10,NULL
|
| 334 |
-
table205,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 335 |
-
table205,1,NULL
|
| 336 |
-
table206,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 337 |
-
table206,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 338 |
-
table206,2,http://w3id.org/sepses/resource/capec#Consequences
|
| 339 |
-
table206,3,NULL
|
| 340 |
-
table206,4,NULL
|
| 341 |
-
table206,5,http://w3id.org/sepses/resource/capec#Mitigations
|
| 342 |
-
table206,6,NULL
|
| 343 |
-
table206,7,NULL
|
| 344 |
-
table206,8,NULL
|
| 345 |
-
table206,9,NULL
|
| 346 |
-
table207,0,http://w3id.org/sepses/resource/cve#CVE
|
| 347 |
-
table207,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 348 |
-
table207,2,NULL
|
| 349 |
-
table207,3,NULL
|
| 350 |
-
table207,4,NULL
|
| 351 |
-
table208,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 352 |
-
table208,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 353 |
-
table208,2,NULL
|
| 354 |
-
table208,3,NULL
|
| 355 |
-
table208,4,NULL
|
| 356 |
-
table208,5,NULL
|
| 357 |
-
table208,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 358 |
-
table208,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 359 |
-
table208,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 360 |
-
table208,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 361 |
-
table208,10,NULL
|
| 362 |
-
table208,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 363 |
-
table208,12,NULL
|
| 364 |
-
table208,13,NULL
|
| 365 |
-
table208,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 366 |
-
table208,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 367 |
-
table208,16,NULL
|
| 368 |
-
table208,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 369 |
-
table208,18,NULL
|
| 370 |
-
table208,19,NULL
|
| 371 |
-
table21,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 372 |
-
table21,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 373 |
-
table21,2,NULL
|
| 374 |
-
table21,3,NULL
|
| 375 |
-
table21,4,NULL
|
| 376 |
-
table21,5,NULL
|
| 377 |
-
table21,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 378 |
-
table21,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 379 |
-
table21,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 380 |
-
table21,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 381 |
-
table21,10,NULL
|
| 382 |
-
table21,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 383 |
-
table21,12,NULL
|
| 384 |
-
table21,13,NULL
|
| 385 |
-
table21,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 386 |
-
table21,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 387 |
-
table21,16,NULL
|
| 388 |
-
table21,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 389 |
-
table21,18,NULL
|
| 390 |
-
table21,19,NULL
|
| 391 |
-
table212,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 392 |
-
table212,1,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 393 |
-
table212,2,NULL
|
| 394 |
-
table212,3,NULL
|
| 395 |
-
table212,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 396 |
-
table212,5,NULL
|
| 397 |
-
table212,6,NULL
|
| 398 |
-
table212,7,NULL
|
| 399 |
-
table212,8,NULL
|
| 400 |
-
table212,9,http://w3id.org/sepses/resource/cwe#Reference
|
| 401 |
-
table213,0,http://w3id.org/sepses/resource/cve#CVE
|
| 402 |
-
table213,1,http://w3id.org/sepses/resource/cpe#vendorName
|
| 403 |
-
table214,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 404 |
-
table214,1,http://w3id.org/sepses/resource/cpe#Product
|
| 405 |
-
table214,2,http://w3id.org/sepses/resource/cpe#productName
|
| 406 |
-
table214,3,NULL
|
| 407 |
-
table214,4,NULL
|
| 408 |
-
table216,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 409 |
-
table216,1,NULL
|
| 410 |
-
table216,2,http://w3id.org/sepses/resource/cpe#productName
|
| 411 |
-
table216,3,NULL
|
| 412 |
-
table216,4,NULL
|
| 413 |
-
table217,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 414 |
-
table217,1,NULL
|
| 415 |
-
table218,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 416 |
-
table218,1,NULL
|
| 417 |
-
table218,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 418 |
-
table22,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 419 |
-
table22,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 420 |
-
table22,2,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 421 |
-
table22,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 422 |
-
table22,4,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 423 |
-
table22,5,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 424 |
-
table22,6,NULL
|
| 425 |
-
table22,7,http://w3id.org/sepses/resource/capec#Consequences
|
| 426 |
-
table22,8,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 427 |
-
table221,0,http://w3id.org/sepses/resource/cve#CVE
|
| 428 |
-
table221,1,NULL
|
| 429 |
-
table221,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 430 |
-
table221,3,http://w3id.org/sepses/resource/cve#Reference
|
| 431 |
-
table223,0,http://w3id.org/sepses/resource/cve#CVE
|
| 432 |
-
table223,1,NULL
|
| 433 |
-
table223,2,http://w3id.org/sepses/resource/cve#Reference
|
| 434 |
-
table223,3,http://w3id.org/sepses/resource/cpe#Product
|
| 435 |
-
table223,4,NULL
|
| 436 |
-
table224,0,http://w3id.org/sepses/resource/cve#CVE
|
| 437 |
-
table224,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 438 |
-
table224,2,NULL
|
| 439 |
-
table224,3,NULL
|
| 440 |
-
table226,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 441 |
-
table226,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 442 |
-
table226,2,http://w3id.org/sepses/resource/cpe#productName
|
| 443 |
-
table226,3,NULL
|
| 444 |
-
table226,4,NULL
|
| 445 |
-
table226,5,NULL
|
| 446 |
-
table226,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 447 |
-
table226,7,http://w3id.org/sepses/resource/cpe#Product
|
| 448 |
-
table226,8,NULL
|
| 449 |
-
table229,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 450 |
-
table229,1,http://w3id.org/sepses/resource/cwe#Reference
|
| 451 |
-
table229,2,NULL
|
| 452 |
-
table229,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 453 |
-
table229,4,NULL
|
| 454 |
-
table229,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 455 |
-
table229,6,NULL
|
| 456 |
-
table229,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 457 |
-
table229,8,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 458 |
-
table229,9,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 459 |
-
table229,10,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 460 |
-
table229,11,NULL
|
| 461 |
-
table229,12,NULL
|
| 462 |
-
table23,0,http://w3id.org/sepses/resource/cve#CVE
|
| 463 |
-
table23,1,NULL
|
| 464 |
-
table23,2,NULL
|
| 465 |
-
table23,3,NULL
|
| 466 |
-
table231,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 467 |
-
table231,1,NULL
|
| 468 |
-
table232,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 469 |
-
table232,1,http://w3id.org/sepses/resource/cwe#Reference
|
| 470 |
-
table232,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 471 |
-
table232,3,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 472 |
-
table232,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 473 |
-
table232,5,NULL
|
| 474 |
-
table232,6,http://w3id.org/sepses/resource/capec#CAPEC
|
| 475 |
-
table232,7,NULL
|
| 476 |
-
table232,8,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 477 |
-
table232,9,NULL
|
| 478 |
-
table232,10,NULL
|
| 479 |
-
table232,11,NULL
|
| 480 |
-
table233,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 481 |
-
table233,1,NULL
|
| 482 |
-
table233,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 483 |
-
table234,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 484 |
-
table234,1,NULL
|
| 485 |
-
table234,2,NULL
|
| 486 |
-
table234,3,NULL
|
| 487 |
-
table234,4,http://w3id.org/sepses/resource/capec#Consequences
|
| 488 |
-
table238,0,http://w3id.org/sepses/resource/cve#CVE
|
| 489 |
-
table238,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 490 |
-
table238,2,NULL
|
| 491 |
-
table238,3,NULL
|
| 492 |
-
table238,4,NULL
|
| 493 |
-
table239,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 494 |
-
table239,1,NULL
|
| 495 |
-
table239,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 496 |
-
table239,3,NULL
|
| 497 |
-
table239,4,NULL
|
| 498 |
-
table24,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 499 |
-
table24,1,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 500 |
-
table24,2,NULL
|
| 501 |
-
table24,3,NULL
|
| 502 |
-
table24,4,NULL
|
| 503 |
-
table24,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 504 |
-
table24,6,NULL
|
| 505 |
-
table24,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 506 |
-
table24,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 507 |
-
table24,9,NULL
|
| 508 |
-
table240,0,http://w3id.org/sepses/resource/cve#CVE
|
| 509 |
-
table240,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 510 |
-
table241,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 511 |
-
table241,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 512 |
-
table241,2,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 513 |
-
table241,3,NULL
|
| 514 |
-
table241,4,NULL
|
| 515 |
-
table244,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 516 |
-
table244,1,http://w3id.org/sepses/resource/capec#Consequences
|
| 517 |
-
table244,2,NULL
|
| 518 |
-
table244,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 519 |
-
table244,4,NULL
|
| 520 |
-
table244,5,NULL
|
| 521 |
-
table244,6,NULL
|
| 522 |
-
table244,7,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 523 |
-
table244,8,http://w3id.org/sepses/resource/capec#Mitigations
|
| 524 |
-
table244,9,NULL
|
| 525 |
-
table244,10,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 526 |
-
table245,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 527 |
-
table245,1,NULL
|
| 528 |
-
table245,2,NULL
|
| 529 |
-
table245,3,NULL
|
| 530 |
-
table245,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 531 |
-
table245,5,NULL
|
| 532 |
-
table246,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 533 |
-
table246,1,NULL
|
| 534 |
-
table246,2,NULL
|
| 535 |
-
table246,3,NULL
|
| 536 |
-
table247,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 537 |
-
table247,1,NULL
|
| 538 |
-
table247,2,NULL
|
| 539 |
-
table247,3,NULL
|
| 540 |
-
table247,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 541 |
-
table247,5,http://w3id.org/sepses/resource/capec#Consequences
|
| 542 |
-
table247,6,NULL
|
| 543 |
-
table247,7,NULL
|
| 544 |
-
table248,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 545 |
-
table248,1,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 546 |
-
table248,2,NULL
|
| 547 |
-
table248,3,NULL
|
| 548 |
-
table248,4,NULL
|
| 549 |
-
table248,5,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 550 |
-
table248,6,http://w3id.org/sepses/resource/capec#Mitigations
|
| 551 |
-
table248,7,NULL
|
| 552 |
-
table251,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 553 |
-
table251,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 554 |
-
table251,2,NULL
|
| 555 |
-
table251,3,NULL
|
| 556 |
-
table251,4,NULL
|
| 557 |
-
table251,5,http://w3id.org/sepses/resource/capec#Mitigations
|
| 558 |
-
table251,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 559 |
-
table251,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 560 |
-
table251,8,NULL
|
| 561 |
-
table251,9,NULL
|
| 562 |
-
table251,10,NULL
|
| 563 |
-
table252,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 564 |
-
table252,1,NULL
|
| 565 |
-
table252,2,http://w3id.org/sepses/resource/cpe#productName
|
| 566 |
-
table252,3,http://w3id.org/sepses/resource/cpe#Vendor
|
| 567 |
-
table253,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 568 |
-
table253,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 569 |
-
table253,2,http://w3id.org/sepses/resource/cpe#productName
|
| 570 |
-
table253,3,NULL
|
| 571 |
-
table253,4,NULL
|
| 572 |
-
table253,5,NULL
|
| 573 |
-
table253,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 574 |
-
table253,7,http://w3id.org/sepses/resource/cpe#Product
|
| 575 |
-
table253,8,NULL
|
| 576 |
-
table254,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 577 |
-
table254,1,NULL
|
| 578 |
-
table254,2,http://w3id.org/sepses/resource/cpe#productName
|
| 579 |
-
table254,3,NULL
|
| 580 |
-
table254,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 581 |
-
table255,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 582 |
-
table255,1,NULL
|
| 583 |
-
table255,2,NULL
|
| 584 |
-
table255,3,NULL
|
| 585 |
-
table255,4,NULL
|
| 586 |
-
table256,0,http://w3id.org/sepses/resource/cve#CVE
|
| 587 |
-
table256,1,NULL
|
| 588 |
-
table256,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 589 |
-
table256,3,http://w3id.org/sepses/resource/cve#Reference
|
| 590 |
-
table257,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 591 |
-
table257,1,NULL
|
| 592 |
-
table257,2,NULL
|
| 593 |
-
table257,3,http://w3id.org/sepses/resource/capec#Mitigations
|
| 594 |
-
table257,4,NULL
|
| 595 |
-
table257,5,http://w3id.org/sepses/resource/capec#CAPEC
|
| 596 |
-
table257,6,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 597 |
-
table257,7,NULL
|
| 598 |
-
table257,8,http://w3id.org/sepses/resource/capec#Consequences
|
| 599 |
-
table258,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 600 |
-
table258,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 601 |
-
table258,2,NULL
|
| 602 |
-
table258,3,http://w3id.org/sepses/resource/cwe#Reference
|
| 603 |
-
table258,4,NULL
|
| 604 |
-
table258,5,NULL
|
| 605 |
-
table258,6,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 606 |
-
table258,7,NULL
|
| 607 |
-
table258,8,NULL
|
| 608 |
-
table258,9,NULL
|
| 609 |
-
table258,10,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 610 |
-
table258,11,http://w3id.org/sepses/resource/capec#CAPEC
|
| 611 |
-
table259,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 612 |
-
table259,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 613 |
-
table259,2,NULL
|
| 614 |
-
table259,3,NULL
|
| 615 |
-
table259,4,NULL
|
| 616 |
-
table259,5,NULL
|
| 617 |
-
table259,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 618 |
-
table259,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 619 |
-
table259,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 620 |
-
table259,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 621 |
-
table259,10,NULL
|
| 622 |
-
table259,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 623 |
-
table259,12,NULL
|
| 624 |
-
table259,13,NULL
|
| 625 |
-
table259,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 626 |
-
table259,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 627 |
-
table259,16,NULL
|
| 628 |
-
table259,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 629 |
-
table259,18,NULL
|
| 630 |
-
table259,19,NULL
|
| 631 |
-
table261,0,http://w3id.org/sepses/resource/cve#CVE
|
| 632 |
-
table261,1,NULL
|
| 633 |
-
table261,2,NULL
|
| 634 |
-
table261,3,http://w3id.org/sepses/resource/cve#Reference
|
| 635 |
-
table261,4,NULL
|
| 636 |
-
table261,5,NULL
|
| 637 |
-
table261,6,NULL
|
| 638 |
-
table263,0,http://w3id.org/sepses/resource/cve#CVE
|
| 639 |
-
table263,1,http://w3id.org/sepses/resource/cpe#vendorName
|
| 640 |
-
table266,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 641 |
-
table266,1,NULL
|
| 642 |
-
table266,2,NULL
|
| 643 |
-
table266,3,NULL
|
| 644 |
-
table266,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 645 |
-
table266,5,NULL
|
| 646 |
-
table266,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 647 |
-
table266,7,NULL
|
| 648 |
-
table266,8,NULL
|
| 649 |
-
table267,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 650 |
-
table267,1,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 651 |
-
table267,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 652 |
-
table267,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 653 |
-
table267,4,NULL
|
| 654 |
-
table267,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 655 |
-
table267,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 656 |
-
table267,7,http://w3id.org/sepses/resource/cwe#Reference
|
| 657 |
-
table268,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 658 |
-
table268,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 659 |
-
table268,2,NULL
|
| 660 |
-
table268,3,NULL
|
| 661 |
-
table268,4,NULL
|
| 662 |
-
table268,5,NULL
|
| 663 |
-
table268,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 664 |
-
table268,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 665 |
-
table268,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 666 |
-
table268,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 667 |
-
table268,10,NULL
|
| 668 |
-
table268,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 669 |
-
table268,12,NULL
|
| 670 |
-
table268,13,NULL
|
| 671 |
-
table268,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 672 |
-
table268,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 673 |
-
table268,16,NULL
|
| 674 |
-
table268,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 675 |
-
table268,18,NULL
|
| 676 |
-
table268,19,NULL
|
| 677 |
-
table268,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 678 |
-
table268,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 679 |
-
table268,2,NULL
|
| 680 |
-
table268,3,NULL
|
| 681 |
-
table268,4,NULL
|
| 682 |
-
table268,5,NULL
|
| 683 |
-
table268,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 684 |
-
table268,7,NULL
|
| 685 |
-
table268,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 686 |
-
table268,9,NULL
|
| 687 |
-
table268,10,NULL
|
| 688 |
-
table268,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 689 |
-
table268,12,NULL
|
| 690 |
-
table268,13,NULL
|
| 691 |
-
table268,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 692 |
-
table268,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 693 |
-
table268,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 694 |
-
table268,17,http://w3id.org/sepses/resource/cwe#Reference
|
| 695 |
-
table268,18,NULL
|
| 696 |
-
table268,19,NULL
|
| 697 |
-
table268,20,NULL
|
| 698 |
-
table268,21,http://w3id.org/sepses/resource/capec#CAPEC
|
| 699 |
-
table268,22,NULL
|
| 700 |
-
table269,0,http://w3id.org/sepses/resource/cve#CVE
|
| 701 |
-
table269,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 702 |
-
table271,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 703 |
-
table271,1,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 704 |
-
table271,2,NULL
|
| 705 |
-
table271,3,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 706 |
-
table271,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 707 |
-
table273,0,http://w3id.org/sepses/resource/cve#CVE
|
| 708 |
-
table273,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 709 |
-
table274,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 710 |
-
table274,1,NULL
|
| 711 |
-
table274,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 712 |
-
table274,3,http://w3id.org/sepses/resource/cpe#productName
|
| 713 |
-
table276,0,http://w3id.org/sepses/resource/cve#CVE
|
| 714 |
-
table276,1,NULL
|
| 715 |
-
table276,2,http://w3id.org/sepses/resource/cve#Reference
|
| 716 |
-
table276,3,http://w3id.org/sepses/resource/cpe#Vendor
|
| 717 |
-
table280,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 718 |
-
table280,1,NULL
|
| 719 |
-
table280,2,NULL
|
| 720 |
-
table281,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 721 |
-
table281,1,http://w3id.org/sepses/resource/cpe#Product
|
| 722 |
-
table281,2,http://w3id.org/sepses/resource/cpe#productName
|
| 723 |
-
table281,3,NULL
|
| 724 |
-
table281,4,NULL
|
| 725 |
-
table282,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 726 |
-
table282,1,NULL
|
| 727 |
-
table282,2,NULL
|
| 728 |
-
table282,3,http://w3id.org/sepses/resource/capec#Mitigations
|
| 729 |
-
table282,4,NULL
|
| 730 |
-
table282,5,http://w3id.org/sepses/resource/cwe#CWE
|
| 731 |
-
table282,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 732 |
-
table282,7,NULL
|
| 733 |
-
table284,0,http://w3id.org/sepses/resource/cve#CVE
|
| 734 |
-
table284,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 735 |
-
table284,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 736 |
-
table284,3,http://w3id.org/sepses/resource/cpe#vendorName
|
| 737 |
-
table284,4,NULL
|
| 738 |
-
table284,5,NULL
|
| 739 |
-
table284,6,http://w3id.org/sepses/resource/cve#Reference
|
| 740 |
-
table286,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 741 |
-
table286,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 742 |
-
table286,2,NULL
|
| 743 |
-
table286,3,NULL
|
| 744 |
-
table286,4,NULL
|
| 745 |
-
table286,5,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 746 |
-
table286,6,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 747 |
-
table287,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 748 |
-
table287,1,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 749 |
-
table287,2,NULL
|
| 750 |
-
table287,3,http://w3id.org/sepses/resource/capec#Mitigations
|
| 751 |
-
table287,4,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 752 |
-
table287,5,NULL
|
| 753 |
-
table287,6,NULL
|
| 754 |
-
table288,0,http://w3id.org/sepses/resource/cve#CVE
|
| 755 |
-
table288,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 756 |
-
table289,0,http://w3id.org/sepses/resource/cve#CVE
|
| 757 |
-
table289,1,http://w3id.org/sepses/resource/cve#Reference
|
| 758 |
-
table289,2,NULL
|
| 759 |
-
table290,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 760 |
-
table290,1,NULL
|
| 761 |
-
table290,2,NULL
|
| 762 |
-
table290,3,http://w3id.org/sepses/resource/cwe#Reference
|
| 763 |
-
table290,4,NULL
|
| 764 |
-
table290,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 765 |
-
table290,6,NULL
|
| 766 |
-
table290,7,NULL
|
| 767 |
-
table290,8,NULL
|
| 768 |
-
table290,9,NULL
|
| 769 |
-
table290,10,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 770 |
-
table290,11,NULL
|
| 771 |
-
table290,12,NULL
|
| 772 |
-
table292,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 773 |
-
table292,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 774 |
-
table292,2,http://w3id.org/sepses/resource/capec#Consequences
|
| 775 |
-
table292,3,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 776 |
-
table292,4,http://w3id.org/sepses/resource/capec#Mitigations
|
| 777 |
-
table292,5,NULL
|
| 778 |
-
table292,6,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 779 |
-
table292,7,NULL
|
| 780 |
-
table292,8,http://w3id.org/sepses/resource/capec#CAPEC
|
| 781 |
-
table296,0,http://w3id.org/sepses/resource/cve#CVE
|
| 782 |
-
table296,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 783 |
-
table297,0,http://w3id.org/sepses/resource/cve#CVE
|
| 784 |
-
table297,1,NULL
|
| 785 |
-
table298,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 786 |
-
table298,1,NULL
|
| 787 |
-
table298,2,NULL
|
| 788 |
-
table298,3,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 789 |
-
table298,4,NULL
|
| 790 |
-
table298,5,http://w3id.org/sepses/resource/capec#Consequences
|
| 791 |
-
table298,6,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 792 |
-
table298,7,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 793 |
-
table298,8,NULL
|
| 794 |
-
table298,9,NULL
|
| 795 |
-
table298,10,http://w3id.org/sepses/resource/capec#Mitigations
|
| 796 |
-
table30,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 797 |
-
table30,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 798 |
-
table30,2,NULL
|
| 799 |
-
table30,3,NULL
|
| 800 |
-
table30,4,NULL
|
| 801 |
-
table30,5,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 802 |
-
table30,6,NULL
|
| 803 |
-
table30,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 804 |
-
table30,8,http://w3id.org/sepses/resource/capec#Mitigations
|
| 805 |
-
table30,9,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 806 |
-
table30,10,NULL
|
| 807 |
-
table301,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 808 |
-
table301,1,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 809 |
-
table301,2,NULL
|
| 810 |
-
table301,3,NULL
|
| 811 |
-
table301,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 812 |
-
table301,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 813 |
-
table301,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 814 |
-
table301,3,NULL
|
| 815 |
-
table301,4,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 816 |
-
table301,5,NULL
|
| 817 |
-
table301,6,NULL
|
| 818 |
-
table301,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 819 |
-
table301,8,NULL
|
| 820 |
-
table301,9,NULL
|
| 821 |
-
table301,10,NULL
|
| 822 |
-
table301,11,NULL
|
| 823 |
-
table301,12,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 824 |
-
table302,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 825 |
-
table302,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 826 |
-
table302,2,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 827 |
-
table302,3,NULL
|
| 828 |
-
table302,4,http://w3id.org/sepses/resource/capec#Mitigations
|
| 829 |
-
table302,5,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 830 |
-
table302,6,NULL
|
| 831 |
-
table302,7,NULL
|
| 832 |
-
table302,8,NULL
|
| 833 |
-
table302,9,NULL
|
| 834 |
-
table302,10,http://w3id.org/sepses/resource/capec#CAPEC
|
| 835 |
-
table303,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 836 |
-
table303,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 837 |
-
table303,2,NULL
|
| 838 |
-
table303,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 839 |
-
table303,4,NULL
|
| 840 |
-
table303,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 841 |
-
table303,6,NULL
|
| 842 |
-
table303,7,NULL
|
| 843 |
-
table304,0,http://w3id.org/sepses/resource/cve#CVE
|
| 844 |
-
table304,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 845 |
-
table305,0,http://w3id.org/sepses/resource/cve#CVE
|
| 846 |
-
table305,1,NULL
|
| 847 |
-
table305,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 848 |
-
table305,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 849 |
-
table305,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 850 |
-
table305,5,http://w3id.org/sepses/resource/cpe#Product
|
| 851 |
-
table305,6,NULL
|
| 852 |
-
table305,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 853 |
-
table305,8,NULL
|
| 854 |
-
table305,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 855 |
-
table305,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 856 |
-
table305,11,http://w3id.org/sepses/resource/cve#Reference
|
| 857 |
-
table307,0,http://w3id.org/sepses/resource/cve#CVE
|
| 858 |
-
table307,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 859 |
-
table307,2,http://w3id.org/sepses/resource/cpe#Vendor
|
| 860 |
-
table310,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 861 |
-
table310,1,NULL
|
| 862 |
-
table310,2,NULL
|
| 863 |
-
table311,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 864 |
-
table311,1,NULL
|
| 865 |
-
table312,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 866 |
-
table312,1,http://w3id.org/sepses/resource/capec#Consequences
|
| 867 |
-
table312,2,NULL
|
| 868 |
-
table312,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 869 |
-
table314,0,http://w3id.org/sepses/resource/cve#CVE
|
| 870 |
-
table314,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 871 |
-
table314,2,http://w3id.org/sepses/resource/capec#CAPEC
|
| 872 |
-
table314,3,http://w3id.org/sepses/resource/cpe#Vendor
|
| 873 |
-
table315,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 874 |
-
table315,1,NULL
|
| 875 |
-
table318,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 876 |
-
table318,1,http://w3id.org/sepses/resource/cpe#Product
|
| 877 |
-
table318,2,http://w3id.org/sepses/resource/cpe#productName
|
| 878 |
-
table318,3,NULL
|
| 879 |
-
table318,4,NULL
|
| 880 |
-
table319,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 881 |
-
table319,1,NULL
|
| 882 |
-
table319,2,NULL
|
| 883 |
-
table319,3,NULL
|
| 884 |
-
table319,4,NULL
|
| 885 |
-
table325,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 886 |
-
table325,1,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 887 |
-
table325,2,NULL
|
| 888 |
-
table325,3,NULL
|
| 889 |
-
table326,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 890 |
-
table326,1,http://w3id.org/sepses/resource/cpe#Product
|
| 891 |
-
table326,2,http://w3id.org/sepses/resource/cpe#productName
|
| 892 |
-
table326,3,NULL
|
| 893 |
-
table330,0,http://w3id.org/sepses/resource/cve#CVE
|
| 894 |
-
table330,1,NULL
|
| 895 |
-
table330,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 896 |
-
table330,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 897 |
-
table330,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 898 |
-
table330,5,http://w3id.org/sepses/resource/cpe#Product
|
| 899 |
-
table330,6,NULL
|
| 900 |
-
table330,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 901 |
-
table330,8,NULL
|
| 902 |
-
table330,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 903 |
-
table330,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 904 |
-
table330,11,http://w3id.org/sepses/resource/cve#Reference
|
| 905 |
-
table331,0,http://w3id.org/sepses/resource/cve#CVE
|
| 906 |
-
table331,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 907 |
-
table331,2,NULL
|
| 908 |
-
table331,3,NULL
|
| 909 |
-
table331,4,http://w3id.org/sepses/resource/cpe#Product
|
| 910 |
-
table332,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 911 |
-
table332,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 912 |
-
table332,2,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 913 |
-
table332,3,NULL
|
| 914 |
-
table332,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 915 |
-
table332,5,NULL
|
| 916 |
-
table332,6,NULL
|
| 917 |
-
table332,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 918 |
-
table332,8,NULL
|
| 919 |
-
table332,9,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 920 |
-
table335,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 921 |
-
table335,1,NULL
|
| 922 |
-
table335,2,NULL
|
| 923 |
-
table335,3,http://w3id.org/sepses/resource/capec#Consequences
|
| 924 |
-
table335,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 925 |
-
table335,5,NULL
|
| 926 |
-
table335,6,http://w3id.org/sepses/resource/capec#Mitigations
|
| 927 |
-
table335,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 928 |
-
table335,8,http://w3id.org/sepses/resource/cwe#CWE
|
| 929 |
-
table335,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 930 |
-
table339,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 931 |
-
table339,1,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 932 |
-
table339,2,NULL
|
| 933 |
-
table339,3,NULL
|
| 934 |
-
table339,4,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 935 |
-
table339,5,NULL
|
| 936 |
-
table339,6,http://w3id.org/sepses/resource/capec#CAPEC
|
| 937 |
-
table339,7,NULL
|
| 938 |
-
table339,8,NULL
|
| 939 |
-
table340,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 940 |
-
table340,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 941 |
-
table340,2,NULL
|
| 942 |
-
table340,3,http://w3id.org/sepses/resource/cpe#CPE
|
| 943 |
-
table340,4,http://w3id.org/sepses/resource/cpe#Product
|
| 944 |
-
table341,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 945 |
-
table341,1,NULL
|
| 946 |
-
table343,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 947 |
-
table343,1,NULL
|
| 948 |
-
table343,2,NULL
|
| 949 |
-
table343,3,http://w3id.org/sepses/resource/cpe#Product
|
| 950 |
-
table343,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 951 |
-
table343,5,NULL
|
| 952 |
-
table344,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 953 |
-
table344,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 954 |
-
table344,2,http://w3id.org/sepses/resource/cpe#productName
|
| 955 |
-
table344,3,NULL
|
| 956 |
-
table344,4,NULL
|
| 957 |
-
table344,5,NULL
|
| 958 |
-
table344,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 959 |
-
table344,7,http://w3id.org/sepses/resource/cpe#Product
|
| 960 |
-
table344,8,NULL
|
| 961 |
-
table345,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 962 |
-
table345,1,NULL
|
| 963 |
-
table345,2,http://w3id.org/sepses/resource/capec#CAPEC
|
| 964 |
-
table345,3,NULL
|
| 965 |
-
table345,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 966 |
-
table345,5,NULL
|
| 967 |
-
table345,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 968 |
-
table345,7,NULL
|
| 969 |
-
table345,8,NULL
|
| 970 |
-
table345,9,NULL
|
| 971 |
-
table345,10,http://w3id.org/sepses/resource/cwe#Reference
|
| 972 |
-
table347,0,http://w3id.org/sepses/resource/cve#CVE
|
| 973 |
-
table347,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 974 |
-
table347,2,NULL
|
| 975 |
-
table347,3,NULL
|
| 976 |
-
table347,4,NULL
|
| 977 |
-
table348,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 978 |
-
table348,1,NULL
|
| 979 |
-
table348,2,NULL
|
| 980 |
-
table348,3,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 981 |
-
table348,4,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 982 |
-
table348,5,NULL
|
| 983 |
-
table348,6,NULL
|
| 984 |
-
table348,7,http://w3id.org/sepses/resource/cwe#Reference
|
| 985 |
-
table348,8,http://w3id.org/sepses/resource/cwe#CWE
|
| 986 |
-
table348,9,NULL
|
| 987 |
-
table348,10,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 988 |
-
table349,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 989 |
-
table349,1,NULL
|
| 990 |
-
table349,2,NULL
|
| 991 |
-
table349,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 992 |
-
table349,4,http://w3id.org/sepses/resource/capec#Mitigations
|
| 993 |
-
table349,5,http://w3id.org/sepses/resource/capec#CAPEC
|
| 994 |
-
table349,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 995 |
-
table349,7,http://w3id.org/sepses/resource/capec#Consequences
|
| 996 |
-
table349,8,NULL
|
| 997 |
-
table350,0,http://w3id.org/sepses/resource/cve#CVE
|
| 998 |
-
table350,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 999 |
-
table352,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1000 |
-
table352,1,NULL
|
| 1001 |
-
table352,2,NULL
|
| 1002 |
-
table352,3,NULL
|
| 1003 |
-
table352,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1004 |
-
table352,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1005 |
-
table353,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1006 |
-
table353,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1007 |
-
table354,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1008 |
-
table354,1,NULL
|
| 1009 |
-
table354,2,http://w3id.org/sepses/resource/cpe#Product
|
| 1010 |
-
table354,3,NULL
|
| 1011 |
-
table354,4,NULL
|
| 1012 |
-
table354,5,http://w3id.org/sepses/resource/cpe#productName
|
| 1013 |
-
table357,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1014 |
-
table357,1,NULL
|
| 1015 |
-
table357,2,NULL
|
| 1016 |
-
table357,3,NULL
|
| 1017 |
-
table357,4,NULL
|
| 1018 |
-
table357,5,NULL
|
| 1019 |
-
table357,6,http://w3id.org/sepses/resource/capec#Consequences
|
| 1020 |
-
table357,7,http://w3id.org/sepses/resource/cwe#CWE
|
| 1021 |
-
table357,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1022 |
-
table357,9,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1023 |
-
table358,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1024 |
-
table358,1,NULL
|
| 1025 |
-
table358,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1026 |
-
table358,1,NULL
|
| 1027 |
-
table359,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1028 |
-
table359,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1029 |
-
table359,2,NULL
|
| 1030 |
-
table359,3,NULL
|
| 1031 |
-
table359,4,NULL
|
| 1032 |
-
table359,5,NULL
|
| 1033 |
-
table359,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1034 |
-
table359,7,NULL
|
| 1035 |
-
table359,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1036 |
-
table359,9,NULL
|
| 1037 |
-
table359,10,NULL
|
| 1038 |
-
table359,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1039 |
-
table359,12,NULL
|
| 1040 |
-
table359,13,NULL
|
| 1041 |
-
table359,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1042 |
-
table359,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1043 |
-
table359,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1044 |
-
table359,17,http://w3id.org/sepses/resource/cwe#Reference
|
| 1045 |
-
table359,18,NULL
|
| 1046 |
-
table359,19,NULL
|
| 1047 |
-
table359,20,NULL
|
| 1048 |
-
table359,21,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1049 |
-
table359,22,NULL
|
| 1050 |
-
table360,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1051 |
-
table360,1,NULL
|
| 1052 |
-
table360,2,NULL
|
| 1053 |
-
table361,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1054 |
-
table361,1,NULL
|
| 1055 |
-
table361,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1056 |
-
table361,3,NULL
|
| 1057 |
-
table361,4,NULL
|
| 1058 |
-
table362,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1059 |
-
table362,1,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1060 |
-
table362,2,NULL
|
| 1061 |
-
table362,3,NULL
|
| 1062 |
-
table362,4,NULL
|
| 1063 |
-
table362,5,NULL
|
| 1064 |
-
table362,6,NULL
|
| 1065 |
-
table364,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1066 |
-
table364,1,NULL
|
| 1067 |
-
table364,2,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1068 |
-
table364,3,NULL
|
| 1069 |
-
table364,4,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1070 |
-
table364,5,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1071 |
-
table364,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 1072 |
-
table364,7,NULL
|
| 1073 |
-
table364,8,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1074 |
-
table364,9,NULL
|
| 1075 |
-
table364,10,NULL
|
| 1076 |
-
table364,11,NULL
|
| 1077 |
-
table367,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1078 |
-
table367,1,NULL
|
| 1079 |
-
table367,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1080 |
-
table368,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1081 |
-
table368,1,NULL
|
| 1082 |
-
table368,2,NULL
|
| 1083 |
-
table368,3,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1084 |
-
table368,4,NULL
|
| 1085 |
-
table368,5,NULL
|
| 1086 |
-
table368,6,http://w3id.org/sepses/resource/cwe#Reference
|
| 1087 |
-
table368,7,NULL
|
| 1088 |
-
table368,8,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1089 |
-
table368,9,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1090 |
-
table369,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1091 |
-
table369,1,NULL
|
| 1092 |
-
table370,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1093 |
-
table370,1,NULL
|
| 1094 |
-
table370,2,NULL
|
| 1095 |
-
table370,3,NULL
|
| 1096 |
-
table370,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1097 |
-
table370,5,NULL
|
| 1098 |
-
table370,6,NULL
|
| 1099 |
-
table371,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1100 |
-
table371,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1101 |
-
table371,2,NULL
|
| 1102 |
-
table371,3,NULL
|
| 1103 |
-
table371,4,NULL
|
| 1104 |
-
table371,5,NULL
|
| 1105 |
-
table371,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1106 |
-
table371,7,NULL
|
| 1107 |
-
table371,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1108 |
-
table371,9,NULL
|
| 1109 |
-
table371,10,NULL
|
| 1110 |
-
table371,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1111 |
-
table371,12,NULL
|
| 1112 |
-
table371,13,NULL
|
| 1113 |
-
table371,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1114 |
-
table371,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1115 |
-
table371,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1116 |
-
table371,17,http://w3id.org/sepses/resource/cwe#Reference
|
| 1117 |
-
table371,18,NULL
|
| 1118 |
-
table371,19,NULL
|
| 1119 |
-
table371,20,NULL
|
| 1120 |
-
table371,21,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1121 |
-
table371,22,NULL
|
| 1122 |
-
table372,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1123 |
-
table372,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1124 |
-
table373,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1125 |
-
table373,1,NULL
|
| 1126 |
-
table373,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1127 |
-
table373,3,NULL
|
| 1128 |
-
table373,4,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1129 |
-
table375,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1130 |
-
table375,1,http://w3id.org/sepses/resource/cve#Reference
|
| 1131 |
-
table378,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1132 |
-
table378,1,NULL
|
| 1133 |
-
table379,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1134 |
-
table379,1,http://w3id.org/sepses/resource/cve#Reference
|
| 1135 |
-
table379,2,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1136 |
-
table379,3,NULL
|
| 1137 |
-
table379,4,http://w3id.org/sepses/resource/cpe#Product
|
| 1138 |
-
table380,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1139 |
-
table380,1,NULL
|
| 1140 |
-
table382,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1141 |
-
table382,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1142 |
-
table382,2,NULL
|
| 1143 |
-
table382,3,NULL
|
| 1144 |
-
table382,4,NULL
|
| 1145 |
-
table383,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1146 |
-
table383,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1147 |
-
table383,2,NULL
|
| 1148 |
-
table383,3,NULL
|
| 1149 |
-
table383,4,NULL
|
| 1150 |
-
table385,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1151 |
-
table385,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1152 |
-
table385,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1153 |
-
table385,3,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1154 |
-
table385,4,NULL
|
| 1155 |
-
table385,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1156 |
-
table386,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1157 |
-
table386,1,NULL
|
| 1158 |
-
table387,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1159 |
-
table387,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1160 |
-
table387,2,NULL
|
| 1161 |
-
table387,3,NULL
|
| 1162 |
-
table387,4,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1163 |
-
table387,5,http://w3id.org/sepses/resource/cwe#CWE
|
| 1164 |
-
table387,6,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1165 |
-
table387,7,NULL
|
| 1166 |
-
table387,8,http://w3id.org/sepses/resource/capec#Consequences
|
| 1167 |
-
table387,9,NULL
|
| 1168 |
-
table387,10,NULL
|
| 1169 |
-
table388,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1170 |
-
table388,1,NULL
|
| 1171 |
-
table388,2,NULL
|
| 1172 |
-
table388,3,NULL
|
| 1173 |
-
table388,4,NULL
|
| 1174 |
-
table388,5,NULL
|
| 1175 |
-
table388,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1176 |
-
table388,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1177 |
-
table390,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1178 |
-
table390,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1179 |
-
table393,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1180 |
-
table393,1,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1181 |
-
table395,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1182 |
-
table395,1,NULL
|
| 1183 |
-
table395,2,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1184 |
-
table395,3,NULL
|
| 1185 |
-
table395,4,NULL
|
| 1186 |
-
table395,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1187 |
-
table395,6,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1188 |
-
table395,7,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1189 |
-
table395,8,NULL
|
| 1190 |
-
table395,9,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1191 |
-
table395,10,NULL
|
| 1192 |
-
table396,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1193 |
-
table396,1,NULL
|
| 1194 |
-
table397,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1195 |
-
table397,1,NULL
|
| 1196 |
-
table397,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1197 |
-
table397,3,NULL
|
| 1198 |
-
table397,4,NULL
|
| 1199 |
-
table397,5,NULL
|
| 1200 |
-
table397,6,NULL
|
| 1201 |
-
table397,7,NULL
|
| 1202 |
-
table399,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1203 |
-
table399,1,NULL
|
| 1204 |
-
table399,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 1205 |
-
table399,3,http://w3id.org/sepses/resource/cpe#productName
|
| 1206 |
-
table400,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1207 |
-
table400,1,NULL
|
| 1208 |
-
table400,2,NULL
|
| 1209 |
-
table400,3,NULL
|
| 1210 |
-
table400,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1211 |
-
table401,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1212 |
-
table401,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1213 |
-
table401,2,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1214 |
-
table401,3,NULL
|
| 1215 |
-
table401,4,NULL
|
| 1216 |
-
table403,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1217 |
-
table403,1,NULL
|
| 1218 |
-
table403,2,NULL
|
| 1219 |
-
table403,3,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1220 |
-
table403,4,NULL
|
| 1221 |
-
table403,5,http://w3id.org/sepses/resource/cpe#CPE
|
| 1222 |
-
table404,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1223 |
-
table404,1,NULL
|
| 1224 |
-
table404,2,NULL
|
| 1225 |
-
table405,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1226 |
-
table405,1,NULL
|
| 1227 |
-
table405,2,NULL
|
| 1228 |
-
table405,3,http://w3id.org/sepses/resource/cve#Reference
|
| 1229 |
-
table405,4,NULL
|
| 1230 |
-
table405,5,NULL
|
| 1231 |
-
table405,6,NULL
|
| 1232 |
-
table406,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1233 |
-
table406,1,NULL
|
| 1234 |
-
table406,2,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1235 |
-
table406,3,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1236 |
-
table406,4,NULL
|
| 1237 |
-
table406,5,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1238 |
-
table407,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1239 |
-
table407,1,NULL
|
| 1240 |
-
table408,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1241 |
-
table408,1,NULL
|
| 1242 |
-
table408,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1243 |
-
table408,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1244 |
-
table408,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1245 |
-
table408,5,http://w3id.org/sepses/resource/cpe#Product
|
| 1246 |
-
table408,6,NULL
|
| 1247 |
-
table408,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1248 |
-
table408,8,NULL
|
| 1249 |
-
table408,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 1250 |
-
table408,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1251 |
-
table408,11,http://w3id.org/sepses/resource/cve#Reference
|
| 1252 |
-
table410,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1253 |
-
table410,1,http://w3id.org/sepses/resource/cve#Reference
|
| 1254 |
-
table410,2,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1255 |
-
table410,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1256 |
-
table410,4,http://w3id.org/sepses/resource/cpe#Product
|
| 1257 |
-
table410,5,NULL
|
| 1258 |
-
table410,6,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1259 |
-
table411,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1260 |
-
table411,1,NULL
|
| 1261 |
-
table411,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1262 |
-
table411,3,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1263 |
-
table411,4,NULL
|
| 1264 |
-
table411,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1265 |
-
table412,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1266 |
-
table412,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1267 |
-
table412,2,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1268 |
-
table412,3,NULL
|
| 1269 |
-
table412,4,NULL
|
| 1270 |
-
table412,5,NULL
|
| 1271 |
-
table412,6,NULL
|
| 1272 |
-
table412,7,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1273 |
-
table412,8,http://w3id.org/sepses/resource/cwe#CWE
|
| 1274 |
-
table412,9,http://w3id.org/sepses/resource/capec#Consequences
|
| 1275 |
-
table412,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1276 |
-
table412,1,NULL
|
| 1277 |
-
table413,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1278 |
-
table413,1,NULL
|
| 1279 |
-
table413,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1280 |
-
table413,3,NULL
|
| 1281 |
-
table413,4,NULL
|
| 1282 |
-
table413,5,NULL
|
| 1283 |
-
table413,6,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1284 |
-
table413,7,NULL
|
| 1285 |
-
table413,8,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1286 |
-
table413,9,NULL
|
| 1287 |
-
table414,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1288 |
-
table414,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1289 |
-
table414,2,NULL
|
| 1290 |
-
table414,3,NULL
|
| 1291 |
-
table414,4,NULL
|
| 1292 |
-
table417,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1293 |
-
table417,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1294 |
-
table417,2,NULL
|
| 1295 |
-
table417,3,NULL
|
| 1296 |
-
table418,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1297 |
-
table418,1,http://w3id.org/sepses/resource/cwe#Reference
|
| 1298 |
-
table418,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1299 |
-
table418,3,NULL
|
| 1300 |
-
table418,4,NULL
|
| 1301 |
-
table418,5,NULL
|
| 1302 |
-
table418,6,NULL
|
| 1303 |
-
table418,7,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1304 |
-
table418,8,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1305 |
-
table418,9,NULL
|
| 1306 |
-
table418,10,NULL
|
| 1307 |
-
table418,11,NULL
|
| 1308 |
-
table419,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1309 |
-
table419,1,NULL
|
| 1310 |
-
table419,2,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1311 |
-
table419,3,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1312 |
-
table419,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 1313 |
-
table419,5,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1314 |
-
table419,6,NULL
|
| 1315 |
-
table419,7,NULL
|
| 1316 |
-
table42,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1317 |
-
table42,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1318 |
-
table42,2,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1319 |
-
table42,3,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1320 |
-
table42,4,NULL
|
| 1321 |
-
table42,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1322 |
-
table42,6,NULL
|
| 1323 |
-
table42,7,NULL
|
| 1324 |
-
table42,8,NULL
|
| 1325 |
-
table42,9,NULL
|
| 1326 |
-
table42,10,http://w3id.org/sepses/resource/cwe#Reference
|
| 1327 |
-
table420,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1328 |
-
table420,1,NULL
|
| 1329 |
-
table420,2,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1330 |
-
table420,3,http://w3id.org/sepses/resource/cwe#Reference
|
| 1331 |
-
table421,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1332 |
-
table421,1,NULL
|
| 1333 |
-
table421,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1334 |
-
table421,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1335 |
-
table421,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1336 |
-
table421,5,http://w3id.org/sepses/resource/cpe#Product
|
| 1337 |
-
table421,6,NULL
|
| 1338 |
-
table421,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1339 |
-
table421,8,NULL
|
| 1340 |
-
table421,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 1341 |
-
table421,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1342 |
-
table421,11,http://w3id.org/sepses/resource/cve#Reference
|
| 1343 |
-
table422,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1344 |
-
table422,1,NULL
|
| 1345 |
-
table422,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1346 |
-
table422,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1347 |
-
table422,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1348 |
-
table422,5,http://w3id.org/sepses/resource/cpe#Product
|
| 1349 |
-
table422,6,NULL
|
| 1350 |
-
table422,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1351 |
-
table422,8,NULL
|
| 1352 |
-
table422,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 1353 |
-
table422,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1354 |
-
table422,11,http://w3id.org/sepses/resource/cve#Reference
|
| 1355 |
-
table423,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1356 |
-
table423,1,NULL
|
| 1357 |
-
table423,2,NULL
|
| 1358 |
-
table423,3,NULL
|
| 1359 |
-
table423,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1360 |
-
table423,5,NULL
|
| 1361 |
-
table424,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1362 |
-
table424,1,NULL
|
| 1363 |
-
table424,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 1364 |
-
table424,3,http://w3id.org/sepses/resource/cpe#productName
|
| 1365 |
-
table425,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1366 |
-
table425,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1367 |
-
table426,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1368 |
-
table426,1,NULL
|
| 1369 |
-
table426,2,NULL
|
| 1370 |
-
table426,3,NULL
|
| 1371 |
-
table426,4,http://w3id.org/sepses/resource/capec#Consequences
|
| 1372 |
-
table427,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1373 |
-
table427,1,NULL
|
| 1374 |
-
table427,2,NULL
|
| 1375 |
-
table427,3,NULL
|
| 1376 |
-
table428,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1377 |
-
table428,1,NULL
|
| 1378 |
-
table428,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1379 |
-
table428,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1380 |
-
table428,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1381 |
-
table428,5,http://w3id.org/sepses/resource/cpe#Product
|
| 1382 |
-
table428,6,NULL
|
| 1383 |
-
table428,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1384 |
-
table428,8,NULL
|
| 1385 |
-
table428,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 1386 |
-
table428,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1387 |
-
table428,11,http://w3id.org/sepses/resource/cve#Reference
|
| 1388 |
-
table429,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1389 |
-
table429,1,NULL
|
| 1390 |
-
table429,2,NULL
|
| 1391 |
-
table429,3,NULL
|
| 1392 |
-
table429,4,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1393 |
-
table429,5,NULL
|
| 1394 |
-
table429,6,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1395 |
-
table429,7,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1396 |
-
table43,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1397 |
-
table43,1,NULL
|
| 1398 |
-
table43,2,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1399 |
-
table43,3,http://w3id.org/sepses/resource/capec#Consequences
|
| 1400 |
-
table43,4,NULL
|
| 1401 |
-
table431,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1402 |
-
table431,1,NULL
|
| 1403 |
-
table431,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 1404 |
-
table431,3,http://w3id.org/sepses/resource/cpe#productName
|
| 1405 |
-
table432,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1406 |
-
table432,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1407 |
-
table432,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1408 |
-
table432,3,NULL
|
| 1409 |
-
table432,4,NULL
|
| 1410 |
-
table432,5,NULL
|
| 1411 |
-
table432,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1412 |
-
table432,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1413 |
-
table432,8,NULL
|
| 1414 |
-
table433,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1415 |
-
table433,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1416 |
-
table434,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1417 |
-
table434,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1418 |
-
table434,2,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1419 |
-
table434,3,http://w3id.org/sepses/resource/cpe#CPE
|
| 1420 |
-
table434,4,NULL
|
| 1421 |
-
table435,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1422 |
-
table435,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1423 |
-
table435,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 1424 |
-
table435,3,NULL
|
| 1425 |
-
table436,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1426 |
-
table436,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1427 |
-
table436,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1428 |
-
table436,3,NULL
|
| 1429 |
-
table436,4,NULL
|
| 1430 |
-
table437,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1431 |
-
table437,1,NULL
|
| 1432 |
-
table438,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1433 |
-
table438,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1434 |
-
table438,2,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1435 |
-
table438,3,http://w3id.org/sepses/resource/cpe#CPE
|
| 1436 |
-
table438,4,NULL
|
| 1437 |
-
table438,5,http://w3id.org/sepses/resource/cwe#CWE
|
| 1438 |
-
table438,6,NULL
|
| 1439 |
-
table439,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1440 |
-
table439,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1441 |
-
table439,2,NULL
|
| 1442 |
-
table439,3,http://w3id.org/sepses/resource/cpe#Product
|
| 1443 |
-
table44,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1444 |
-
table44,1,NULL
|
| 1445 |
-
table44,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1446 |
-
table440,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1447 |
-
table440,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1448 |
-
table440,2,NULL
|
| 1449 |
-
table440,3,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1450 |
-
table440,4,NULL
|
| 1451 |
-
table440,5,NULL
|
| 1452 |
-
table440,6,http://w3id.org/sepses/resource/cwe#Reference
|
| 1453 |
-
table440,7,NULL
|
| 1454 |
-
table441,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1455 |
-
table441,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1456 |
-
table441,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1457 |
-
table441,3,NULL
|
| 1458 |
-
table441,4,NULL
|
| 1459 |
-
table442,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1460 |
-
table442,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1461 |
-
table442,2,NULL
|
| 1462 |
-
table442,3,NULL
|
| 1463 |
-
table442,4,NULL
|
| 1464 |
-
table442,5,NULL
|
| 1465 |
-
table442,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1466 |
-
table442,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1467 |
-
table442,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1468 |
-
table442,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1469 |
-
table442,10,NULL
|
| 1470 |
-
table442,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1471 |
-
table442,12,NULL
|
| 1472 |
-
table442,13,NULL
|
| 1473 |
-
table442,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 1474 |
-
table442,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1475 |
-
table442,16,NULL
|
| 1476 |
-
table442,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 1477 |
-
table442,18,NULL
|
| 1478 |
-
table442,19,NULL
|
| 1479 |
-
table443,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1480 |
-
table443,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1481 |
-
table443,2,NULL
|
| 1482 |
-
table443,3,NULL
|
| 1483 |
-
table443,4,NULL
|
| 1484 |
-
table443,5,NULL
|
| 1485 |
-
table443,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1486 |
-
table443,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1487 |
-
table443,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1488 |
-
table443,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1489 |
-
table443,10,NULL
|
| 1490 |
-
table443,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1491 |
-
table443,12,NULL
|
| 1492 |
-
table443,13,NULL
|
| 1493 |
-
table443,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 1494 |
-
table443,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1495 |
-
table443,16,NULL
|
| 1496 |
-
table443,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 1497 |
-
table443,18,NULL
|
| 1498 |
-
table443,19,NULL
|
| 1499 |
-
table444,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1500 |
-
table444,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1501 |
-
table444,2,http://w3id.org/sepses/resource/cve#Reference
|
| 1502 |
-
table444,3,NULL
|
| 1503 |
-
table444,4,NULL
|
| 1504 |
-
table444,5,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1505 |
-
table445,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1506 |
-
table445,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1507 |
-
table445,2,NULL
|
| 1508 |
-
table445,3,NULL
|
| 1509 |
-
table446,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1510 |
-
table446,1,NULL
|
| 1511 |
-
table446,2,NULL
|
| 1512 |
-
table446,3,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1513 |
-
table446,4,http://w3id.org/sepses/resource/cpe#Product
|
| 1514 |
-
table446,5,http://w3id.org/sepses/resource/cpe#CPE
|
| 1515 |
-
table447,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1516 |
-
table447,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1517 |
-
table447,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1518 |
-
table447,3,NULL
|
| 1519 |
-
table447,4,NULL
|
| 1520 |
-
table447,5,NULL
|
| 1521 |
-
table447,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1522 |
-
table447,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1523 |
-
table447,8,NULL
|
| 1524 |
-
table448,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1525 |
-
table448,1,NULL
|
| 1526 |
-
table449,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1527 |
-
table449,1,NULL
|
| 1528 |
-
table45,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1529 |
-
table45,1,NULL
|
| 1530 |
-
table45,2,NULL
|
| 1531 |
-
table450,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1532 |
-
table450,1,http://w3id.org/sepses/resource/cwe#Reference
|
| 1533 |
-
table450,2,NULL
|
| 1534 |
-
table450,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1535 |
-
table450,4,NULL
|
| 1536 |
-
table450,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1537 |
-
table450,6,NULL
|
| 1538 |
-
table450,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1539 |
-
table450,8,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1540 |
-
table450,9,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1541 |
-
table450,10,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1542 |
-
table450,11,NULL
|
| 1543 |
-
table450,12,NULL
|
| 1544 |
-
table451,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1545 |
-
table451,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1546 |
-
table451,2,http://w3id.org/sepses/resource/cpe#CPE
|
| 1547 |
-
table451,3,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1548 |
-
table451,4,NULL
|
| 1549 |
-
table452,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1550 |
-
table452,1,NULL
|
| 1551 |
-
table452,2,http://w3id.org/sepses/resource/cwe#CWE
|
| 1552 |
-
table452,3,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1553 |
-
table452,4,NULL
|
| 1554 |
-
table452,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1555 |
-
table452,6,NULL
|
| 1556 |
-
table452,7,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1557 |
-
table452,8,NULL
|
| 1558 |
-
table452,9,http://w3id.org/sepses/resource/cwe#Reference
|
| 1559 |
-
table452,10,NULL
|
| 1560 |
-
table453,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1561 |
-
table453,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1562 |
-
table453,2,NULL
|
| 1563 |
-
table453,3,NULL
|
| 1564 |
-
table453,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1565 |
-
table453,5,NULL
|
| 1566 |
-
table454,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1567 |
-
table454,1,NULL
|
| 1568 |
-
table454,2,NULL
|
| 1569 |
-
table454,3,NULL
|
| 1570 |
-
table455,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1571 |
-
table455,1,NULL
|
| 1572 |
-
table455,2,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1573 |
-
table456,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1574 |
-
table456,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1575 |
-
table456,2,NULL
|
| 1576 |
-
table456,3,NULL
|
| 1577 |
-
table456,4,NULL
|
| 1578 |
-
table456,5,NULL
|
| 1579 |
-
table456,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 1580 |
-
table456,7,NULL
|
| 1581 |
-
table458,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1582 |
-
table458,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1583 |
-
table458,2,NULL
|
| 1584 |
-
table458,3,NULL
|
| 1585 |
-
table458,4,NULL
|
| 1586 |
-
table459,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1587 |
-
table459,1,NULL
|
| 1588 |
-
table460,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1589 |
-
table460,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1590 |
-
table460,2,NULL
|
| 1591 |
-
table460,3,NULL
|
| 1592 |
-
table460,4,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1593 |
-
table460,5,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1594 |
-
table460,6,http://w3id.org/sepses/resource/cwe#Reference
|
| 1595 |
-
table460,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1596 |
-
table462,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1597 |
-
table462,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1598 |
-
table462,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1599 |
-
table462,3,NULL
|
| 1600 |
-
table462,4,NULL
|
| 1601 |
-
table463,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1602 |
-
table463,1,NULL
|
| 1603 |
-
table463,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1604 |
-
table463,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1605 |
-
table463,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1606 |
-
table463,5,http://w3id.org/sepses/resource/cpe#Product
|
| 1607 |
-
table463,6,NULL
|
| 1608 |
-
table463,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1609 |
-
table463,8,NULL
|
| 1610 |
-
table463,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 1611 |
-
table463,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1612 |
-
table463,11,http://w3id.org/sepses/resource/cve#Reference
|
| 1613 |
-
table464,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1614 |
-
table464,1,NULL
|
| 1615 |
-
table464,2,NULL
|
| 1616 |
-
table464,3,NULL
|
| 1617 |
-
table464,4,NULL
|
| 1618 |
-
table465,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1619 |
-
table465,1,NULL
|
| 1620 |
-
table465,2,NULL
|
| 1621 |
-
table465,3,NULL
|
| 1622 |
-
table465,4,NULL
|
| 1623 |
-
table465,5,NULL
|
| 1624 |
-
table465,6,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1625 |
-
table465,7,NULL
|
| 1626 |
-
table465,8,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1627 |
-
table465,9,NULL
|
| 1628 |
-
table465,10,NULL
|
| 1629 |
-
table466,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1630 |
-
table466,1,NULL
|
| 1631 |
-
table467,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1632 |
-
table467,1,NULL
|
| 1633 |
-
table468,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1634 |
-
table468,1,NULL
|
| 1635 |
-
table469,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1636 |
-
table469,1,NULL
|
| 1637 |
-
table470,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1638 |
-
table470,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1639 |
-
table470,2,http://w3id.org/sepses/resource/cve#Reference
|
| 1640 |
-
table470,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1641 |
-
table470,4,http://w3id.org/sepses/resource/cpe#Product
|
| 1642 |
-
table470,5,NULL
|
| 1643 |
-
table470,6,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1644 |
-
table471,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1645 |
-
table471,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1646 |
-
table471,2,NULL
|
| 1647 |
-
table471,3,NULL
|
| 1648 |
-
table471,4,NULL
|
| 1649 |
-
table472,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1650 |
-
table472,1,NULL
|
| 1651 |
-
table472,2,NULL
|
| 1652 |
-
table472,3,NULL
|
| 1653 |
-
table472,4,NULL
|
| 1654 |
-
table473,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1655 |
-
table473,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1656 |
-
table473,2,http://w3id.org/sepses/resource/cpe#Product
|
| 1657 |
-
table473,3,NULL
|
| 1658 |
-
table473,4,NULL
|
| 1659 |
-
table473,5,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1660 |
-
table474,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1661 |
-
table474,1,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1662 |
-
table474,2,NULL
|
| 1663 |
-
table474,3,NULL
|
| 1664 |
-
table474,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 1665 |
-
table476,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1666 |
-
table476,1,NULL
|
| 1667 |
-
table476,2,NULL
|
| 1668 |
-
table476,3,NULL
|
| 1669 |
-
table476,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1670 |
-
table476,5,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1671 |
-
table476,6,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1672 |
-
table476,7,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1673 |
-
table476,8,NULL
|
| 1674 |
-
table477,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1675 |
-
table477,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1676 |
-
table477,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1677 |
-
table477,3,NULL
|
| 1678 |
-
table477,4,NULL
|
| 1679 |
-
table477,5,NULL
|
| 1680 |
-
table477,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1681 |
-
table477,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1682 |
-
table477,8,NULL
|
| 1683 |
-
table478,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1684 |
-
table478,1,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1685 |
-
table478,2,NULL
|
| 1686 |
-
table478,3,NULL
|
| 1687 |
-
table478,4,NULL
|
| 1688 |
-
table478,5,NULL
|
| 1689 |
-
table478,6,NULL
|
| 1690 |
-
table478,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1691 |
-
table478,1,NULL
|
| 1692 |
-
table478,2,NULL
|
| 1693 |
-
table478,3,NULL
|
| 1694 |
-
table479,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1695 |
-
table479,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1696 |
-
table479,2,NULL
|
| 1697 |
-
table479,3,NULL
|
| 1698 |
-
table480,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1699 |
-
table480,1,NULL
|
| 1700 |
-
table480,2,NULL
|
| 1701 |
-
table480,3,NULL
|
| 1702 |
-
table480,4,http://w3id.org/sepses/resource/cwe#CWE
|
| 1703 |
-
table480,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1704 |
-
table480,6,NULL
|
| 1705 |
-
table480,7,NULL
|
| 1706 |
-
table480,8,http://w3id.org/sepses/resource/cwe#Reference
|
| 1707 |
-
table481,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1708 |
-
table481,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1709 |
-
table481,2,NULL
|
| 1710 |
-
table481,3,NULL
|
| 1711 |
-
table481,4,NULL
|
| 1712 |
-
table481,5,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1713 |
-
table481,6,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1714 |
-
table481,7,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1715 |
-
table481,8,NULL
|
| 1716 |
-
table481,9,NULL
|
| 1717 |
-
table482,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1718 |
-
table482,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1719 |
-
table482,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1720 |
-
table482,3,NULL
|
| 1721 |
-
table482,4,NULL
|
| 1722 |
-
table482,5,NULL
|
| 1723 |
-
table482,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1724 |
-
table482,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1725 |
-
table482,8,NULL
|
| 1726 |
-
table483,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1727 |
-
table483,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1728 |
-
table483,2,NULL
|
| 1729 |
-
table483,3,NULL
|
| 1730 |
-
table483,4,NULL
|
| 1731 |
-
table483,5,NULL
|
| 1732 |
-
table483,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1733 |
-
table483,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1734 |
-
table483,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1735 |
-
table483,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1736 |
-
table483,10,NULL
|
| 1737 |
-
table483,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1738 |
-
table483,12,NULL
|
| 1739 |
-
table483,13,NULL
|
| 1740 |
-
table483,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 1741 |
-
table483,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1742 |
-
table483,16,NULL
|
| 1743 |
-
table483,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 1744 |
-
table483,18,NULL
|
| 1745 |
-
table483,19,NULL
|
| 1746 |
-
table484,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1747 |
-
table484,1,NULL
|
| 1748 |
-
table484,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1749 |
-
table484,3,http://w3id.org/sepses/resource/cwe#CWE
|
| 1750 |
-
table484,4,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1751 |
-
table484,5,http://w3id.org/sepses/resource/cpe#Product
|
| 1752 |
-
table484,6,NULL
|
| 1753 |
-
table484,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1754 |
-
table484,8,NULL
|
| 1755 |
-
table484,9,http://w3id.org/sepses/resource/cpe#CPE
|
| 1756 |
-
table484,10,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1757 |
-
table484,11,http://w3id.org/sepses/resource/cve#Reference
|
| 1758 |
-
table485,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1759 |
-
table485,1,NULL
|
| 1760 |
-
table486,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1761 |
-
table486,1,NULL
|
| 1762 |
-
table487,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1763 |
-
table487,1,NULL
|
| 1764 |
-
table487,2,http://w3id.org/sepses/resource/cpe#Product
|
| 1765 |
-
table487,3,http://w3id.org/sepses/resource/cve#Reference
|
| 1766 |
-
table487,4,NULL
|
| 1767 |
-
table488,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1768 |
-
table488,1,NULL
|
| 1769 |
-
table488,2,NULL
|
| 1770 |
-
table488,3,NULL
|
| 1771 |
-
table489,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1772 |
-
table489,1,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1773 |
-
table489,2,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1774 |
-
table489,3,http://w3id.org/sepses/resource/capec#Consequences
|
| 1775 |
-
table489,4,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1776 |
-
table489,5,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1777 |
-
table49,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1778 |
-
table49,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1779 |
-
table49,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1780 |
-
table49,3,NULL
|
| 1781 |
-
table49,4,NULL
|
| 1782 |
-
table49,5,NULL
|
| 1783 |
-
table49,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1784 |
-
table49,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1785 |
-
table49,8,NULL
|
| 1786 |
-
table490,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1787 |
-
table490,1,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1788 |
-
table490,2,NULL
|
| 1789 |
-
table490,3,NULL
|
| 1790 |
-
table490,4,NULL
|
| 1791 |
-
table490,5,NULL
|
| 1792 |
-
table490,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1793 |
-
table490,7,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1794 |
-
table490,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1795 |
-
table490,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1796 |
-
table490,10,NULL
|
| 1797 |
-
table490,11,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1798 |
-
table490,12,NULL
|
| 1799 |
-
table490,13,NULL
|
| 1800 |
-
table490,14,http://w3id.org/sepses/resource/capec#Consequences
|
| 1801 |
-
table490,15,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1802 |
-
table490,16,NULL
|
| 1803 |
-
table490,17,http://w3id.org/sepses/resource/cwe#CWE
|
| 1804 |
-
table490,18,NULL
|
| 1805 |
-
table490,19,NULL
|
| 1806 |
-
table491,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1807 |
-
table491,1,NULL
|
| 1808 |
-
table491,2,NULL
|
| 1809 |
-
table491,3,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1810 |
-
table491,4,NULL
|
| 1811 |
-
table491,5,http://w3id.org/sepses/resource/cwe#CWE
|
| 1812 |
-
table491,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1813 |
-
table491,7,NULL
|
| 1814 |
-
table492,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1815 |
-
table492,1,http://w3id.org/sepses/resource/cpe#Product
|
| 1816 |
-
table492,2,NULL
|
| 1817 |
-
table492,3,http://w3id.org/sepses/resource/cpe#productName
|
| 1818 |
-
table493,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1819 |
-
table493,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1820 |
-
table494,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1821 |
-
table494,1,http://w3id.org/sepses/resource/capec#Consequences
|
| 1822 |
-
table494,2,NULL
|
| 1823 |
-
table494,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 1824 |
-
table495,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1825 |
-
table495,1,NULL
|
| 1826 |
-
table495,2,NULL
|
| 1827 |
-
table496,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1828 |
-
table496,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1829 |
-
table497,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1830 |
-
table497,1,NULL
|
| 1831 |
-
table497,2,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1832 |
-
table497,3,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1833 |
-
table497,4,http://w3id.org/sepses/resource/capec#Consequences
|
| 1834 |
-
table497,5,http://w3id.org/sepses/resource/capec#Mitigations
|
| 1835 |
-
table498,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1836 |
-
table498,1,NULL
|
| 1837 |
-
table498,2,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1838 |
-
table498,3,http://w3id.org/sepses/resource/cpe#Product
|
| 1839 |
-
table499,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1840 |
-
table499,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1841 |
-
table499,2,NULL
|
| 1842 |
-
table5,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1843 |
-
table5,1,NULL
|
| 1844 |
-
table5,2,NULL
|
| 1845 |
-
table5,3,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1846 |
-
table5,4,NULL
|
| 1847 |
-
table500,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1848 |
-
table500,1,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1849 |
-
table500,2,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1850 |
-
table500,3,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1851 |
-
table500,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
| 1852 |
-
table500,5,NULL
|
| 1853 |
-
table500,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 1854 |
-
table500,7,NULL
|
| 1855 |
-
table500,8,NULL
|
| 1856 |
-
table500,9,NULL
|
| 1857 |
-
table52,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1858 |
-
table52,1,http://w3id.org/sepses/resource/cvss#baseSeverity
|
| 1859 |
-
table59,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1860 |
-
table59,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1861 |
-
table59,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1862 |
-
table59,3,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1863 |
-
table59,4,NULL
|
| 1864 |
-
table59,5,NULL
|
| 1865 |
-
table59,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1866 |
-
table59,7,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1867 |
-
table61,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1868 |
-
table61,1,NULL
|
| 1869 |
-
table61,2,NULL
|
| 1870 |
-
table61,3,NULL
|
| 1871 |
-
table61,4,http://w3id.org/sepses/resource/cwe#Reference
|
| 1872 |
-
table61,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1873 |
-
table61,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1874 |
-
table61,7,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1875 |
-
table61,8,NULL
|
| 1876 |
-
table61,9,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1877 |
-
table61,10,NULL
|
| 1878 |
-
table61,11,NULL
|
| 1879 |
-
table61,12,NULL
|
| 1880 |
-
table62,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1881 |
-
table62,1,NULL
|
| 1882 |
-
table62,2,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1883 |
-
table62,3,http://w3id.org/sepses/resource/cwe#Reference
|
| 1884 |
-
table65,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1885 |
-
table65,1,NULL
|
| 1886 |
-
table65,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1887 |
-
table65,3,http://w3id.org/sepses/resource/cve#Reference
|
| 1888 |
-
table68,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1889 |
-
table68,1,NULL
|
| 1890 |
-
table70,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1891 |
-
table70,1,NULL
|
| 1892 |
-
table70,2,NULL
|
| 1893 |
-
table70,3,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1894 |
-
table70,4,NULL
|
| 1895 |
-
table70,5,NULL
|
| 1896 |
-
table70,6,NULL
|
| 1897 |
-
table70,7,NULL
|
| 1898 |
-
table70,8,http://w3id.org/sepses/resource/cwe#CWE
|
| 1899 |
-
table72,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1900 |
-
table72,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1901 |
-
table72,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1902 |
-
table72,3,NULL
|
| 1903 |
-
table72,4,NULL
|
| 1904 |
-
table72,5,NULL
|
| 1905 |
-
table72,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1906 |
-
table72,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1907 |
-
table72,8,NULL
|
| 1908 |
-
table73,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1909 |
-
table73,1,NULL
|
| 1910 |
-
table73,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1911 |
-
table73,3,NULL
|
| 1912 |
-
table73,4,http://w3id.org/sepses/resource/cwe#Reference
|
| 1913 |
-
table73,5,NULL
|
| 1914 |
-
table73,6,NULL
|
| 1915 |
-
table73,7,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1916 |
-
table73,8,NULL
|
| 1917 |
-
table73,9,NULL
|
| 1918 |
-
table73,10,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1919 |
-
table73,11,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1920 |
-
table73,12,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1921 |
-
table77,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1922 |
-
table77,1,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 1923 |
-
table77,2,http://w3id.org/sepses/resource/capec#typicalSeverity
|
| 1924 |
-
table77,3,NULL
|
| 1925 |
-
table77,4,NULL
|
| 1926 |
-
table77,5,http://w3id.org/sepses/resource/cwe#CWE
|
| 1927 |
-
table77,6,http://w3id.org/sepses/resource/capec#ExecutionFlow
|
| 1928 |
-
table78,0,http://w3id.org/sepses/resource/cpe#CPE
|
| 1929 |
-
table78,1,http://w3id.org/sepses/resource/cpe#CPE
|
| 1930 |
-
table78,2,http://w3id.org/sepses/resource/cpe#productName
|
| 1931 |
-
table78,3,NULL
|
| 1932 |
-
table78,4,NULL
|
| 1933 |
-
table78,5,NULL
|
| 1934 |
-
table78,6,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1935 |
-
table78,7,http://w3id.org/sepses/resource/cpe#Product
|
| 1936 |
-
table78,8,NULL
|
| 1937 |
-
table80,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1938 |
-
table80,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1939 |
-
table80,2,NULL
|
| 1940 |
-
table80,3,NULL
|
| 1941 |
-
table80,4,NULL
|
| 1942 |
-
table80,5,NULL
|
| 1943 |
-
table80,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
|
| 1944 |
-
table80,7,NULL
|
| 1945 |
-
table80,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1946 |
-
table80,9,NULL
|
| 1947 |
-
table80,10,NULL
|
| 1948 |
-
table80,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1949 |
-
table80,12,NULL
|
| 1950 |
-
table80,13,NULL
|
| 1951 |
-
table80,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
|
| 1952 |
-
table80,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
|
| 1953 |
-
table80,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1954 |
-
table80,17,http://w3id.org/sepses/resource/cwe#Reference
|
| 1955 |
-
table80,18,NULL
|
| 1956 |
-
table80,19,NULL
|
| 1957 |
-
table80,20,NULL
|
| 1958 |
-
table80,21,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1959 |
-
table80,22,NULL
|
| 1960 |
-
table82,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1961 |
-
table82,1,NULL
|
| 1962 |
-
table82,2,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1963 |
-
table82,3,http://w3id.org/sepses/resource/cve#Reference
|
| 1964 |
-
table82,4,http://w3id.org/sepses/resource/cpe#CPE
|
| 1965 |
-
table83,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1966 |
-
table83,1,NULL
|
| 1967 |
-
table83,2,http://w3id.org/sepses/resource/cve#Reference
|
| 1968 |
-
table83,3,NULL
|
| 1969 |
-
table83,4,http://w3id.org/sepses/resource/cpe#vendorName
|
| 1970 |
-
table83,5,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1971 |
-
table83,6,http://w3id.org/sepses/resource/cpe#CPE
|
| 1972 |
-
table88,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1973 |
-
table88,1,NULL
|
| 1974 |
-
table91,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1975 |
-
table91,1,http://w3id.org/sepses/resource/cpe#Vendor
|
| 1976 |
-
table91,2,http://w3id.org/sepses/resource/cpe#Product
|
| 1977 |
-
table96,0,http://w3id.org/sepses/resource/cwe#CWE
|
| 1978 |
-
table96,1,NULL
|
| 1979 |
-
table96,2,NULL
|
| 1980 |
-
table96,3,NULL
|
| 1981 |
-
table96,4,NULL
|
| 1982 |
-
table96,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
|
| 1983 |
-
table96,6,http://w3id.org/sepses/resource/cwe#CWE
|
| 1984 |
-
table96,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
|
| 1985 |
-
table96,8,NULL
|
| 1986 |
-
table96,9,NULL
|
| 1987 |
-
table96,10,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
|
| 1988 |
-
table96,11,NULL
|
| 1989 |
-
table97,0,http://w3id.org/sepses/resource/cve#CVE
|
| 1990 |
-
table97,1,NULL
|
| 1991 |
-
table97,2,NULL
|
| 1992 |
-
table97,3,http://w3id.org/sepses/resource/cve#Reference
|
| 1993 |
-
table97,4,NULL
|
| 1994 |
-
table97,5,NULL
|
| 1995 |
-
table97,6,NULL
|
| 1996 |
-
table98,0,http://w3id.org/sepses/resource/capec#CAPEC
|
| 1997 |
-
table98,1,http://w3id.org/sepses/resource/cwe#CWE
|
| 1998 |
-
table98,2,NULL
|
| 1999 |
-
table98,3,NULL
|
| 2000 |
-
table98,4,http://w3id.org/sepses/resource/capec#likehoodOfAttack
|
| 2001 |
-
table98,5,http://w3id.org/sepses/resource/capec#SkillRequired
|
| 2002 |
-
table98,6,NULL
|
| 2003 |
-
table98,7,NULL
|
| 2004 |
-
table98,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Train/tables/table1.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|