fokobrice3 commited on
Commit
d5aaedc
·
1 Parent(s): 3ad8ecb

first push for Train folder

Browse files
Train/SEPSES_CTA_ground_truth.csv ADDED
@@ -0,0 +1,2004 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ table_name,column_id,label
2
+ table1,0,http://w3id.org/sepses/vocab/ref/cwe#CWE
3
+ table1,1,http://w3id.org/sepses/vocab/ref/cwe#CWE
4
+ table1,2,NULL
5
+ table1,3,NULL
6
+ table1,4,NULL
7
+ table1,5,NULL
8
+ table1,6,http://w3id.org/sepses/vocab/ref/cwe#RelatedWeakness
9
+ table1,7,NULL
10
+ table1,8,http://w3id.org/sepses/vocab/ref/cwe#AplicablePlatform
11
+ table1,9,NULL
12
+ table1,10,NULL
13
+ table1,11,http://w3id.org/sepses/vocab/ref/cwe#ModeOfIntroduction
14
+ table1,12,NULL
15
+ table1,13,NULL
16
+ table1,14,http://w3id.org/sepses/vocab/ref/cwe#CommonConsequence
17
+ table1,15,http://w3id.org/sepses/vocab/ref/cwe#DetectionMethod
18
+ table1,16,http://w3id.org/sepses/vocab/ref/cwe#PotentialMitigation
19
+ table1,17,http://w3id.org/sepses/vocab/ref/cwe#Reference
20
+ table1,18,NULL
21
+ table1,19,NULL
22
+ table1,20,NULL
23
+ table1,21,http://w3id.org/sepses/vocab/ref/capec#CAPEC
24
+ table1,22,NULL
25
+ table107,0,http://w3id.org/sepses/resource/cve#CVE
26
+ table107,1,http://w3id.org/sepses/resource/cvss#baseSeverity
27
+ table107,2,NULL
28
+ table107,3,http://w3id.org/sepses/resource/cve#Reference
29
+ table107,4,http://w3id.org/sepses/resource/cwe#CWE
30
+ table108,0,http://w3id.org/sepses/resource/cwe#CWE
31
+ table108,1,NULL
32
+ table110,0,http://w3id.org/sepses/resource/capec#CAPEC
33
+ table110,1,NULL
34
+ table113,0,http://w3id.org/sepses/resource/cve#CVE
35
+ table113,1,NULL
36
+ table113,2,NULL
37
+ table113,3,http://w3id.org/sepses/resource/cpe#Product
38
+ table113,4,http://w3id.org/sepses/resource/cwe#CWE
39
+ table113,5,http://w3id.org/sepses/resource/cvss#baseSeverity
40
+ table116,0,http://w3id.org/sepses/resource/capec#CAPEC
41
+ table116,1,http://w3id.org/sepses/resource/capec#Mitigations
42
+ table116,2,NULL
43
+ table116,3,NULL
44
+ table116,4,NULL
45
+ table116,5,NULL
46
+ table12,0,http://w3id.org/sepses/resource/cwe#CWE
47
+ table12,1,http://w3id.org/sepses/resource/cwe#Reference
48
+ table12,2,NULL
49
+ table12,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
50
+ table12,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
51
+ table122,0,http://w3id.org/sepses/resource/cpe#CPE
52
+ table122,1,NULL
53
+ table122,2,http://w3id.org/sepses/resource/cpe#CPE
54
+ table122,3,http://w3id.org/sepses/resource/cpe#productName
55
+ table123,0,http://w3id.org/sepses/resource/cpe#CPE
56
+ table123,1,http://w3id.org/sepses/resource/cpe#CPE
57
+ table123,2,http://w3id.org/sepses/resource/cpe#productName
58
+ table123,3,NULL
59
+ table123,4,NULL
60
+ table123,5,NULL
61
+ table123,6,http://w3id.org/sepses/resource/cpe#Vendor
62
+ table123,7,http://w3id.org/sepses/resource/cpe#Product
63
+ table123,8,NULL
64
+ table126,0,http://w3id.org/sepses/resource/capec#CAPEC
65
+ table126,1,NULL
66
+ table126,2,NULL
67
+ table126,3,NULL
68
+ table126,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
69
+ table126,5,NULL
70
+ table128,0,http://w3id.org/sepses/resource/cve#CVE
71
+ table128,1,http://w3id.org/sepses/resource/cpe#Vendor
72
+ table128,2,http://w3id.org/sepses/resource/cpe#CPE
73
+ table128,3,http://w3id.org/sepses/resource/cvss#baseSeverity
74
+ table128,4,NULL
75
+ table130,0,http://w3id.org/sepses/resource/cwe#CWE
76
+ table130,1,NULL
77
+ table130,2,NULL
78
+ table130,3,NULL
79
+ table130,4,NULL
80
+ table130,5,http://w3id.org/sepses/resource/cwe#Reference
81
+ table130,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
82
+ table130,7,NULL
83
+ table130,8,NULL
84
+ table130,9,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
85
+ table130,10,http://w3id.org/sepses/resource/cwe#CommonConsequence
86
+ table130,11,NULL
87
+ table130,12,NULL
88
+ table132,0,http://w3id.org/sepses/resource/cpe#CPE
89
+ table132,1,http://w3id.org/sepses/resource/cpe#Product
90
+ table132,2,http://w3id.org/sepses/resource/cpe#CPE
91
+ table132,3,NULL
92
+ table132,4,NULL
93
+ table134,0,http://w3id.org/sepses/resource/capec#CAPEC
94
+ table134,1,NULL
95
+ table134,2,http://w3id.org/sepses/resource/capec#likehoodOfAttack
96
+ table134,3,http://w3id.org/sepses/resource/capec#CAPEC
97
+ table134,4,http://w3id.org/sepses/resource/capec#Consequences
98
+ table134,5,http://w3id.org/sepses/resource/cwe#CWE
99
+ table134,6,http://w3id.org/sepses/resource/capec#ExecutionFlow
100
+ table138,0,http://w3id.org/sepses/resource/cve#CVE
101
+ table138,1,NULL
102
+ table138,2,NULL
103
+ table138,3,http://w3id.org/sepses/resource/cve#Reference
104
+ table138,4,NULL
105
+ table138,5,NULL
106
+ table138,6,NULL
107
+ table140,0,http://w3id.org/sepses/resource/cve#CVE
108
+ table140,1,http://w3id.org/sepses/resource/cpe#vendorName
109
+ table146,0,http://w3id.org/sepses/resource/cpe#CPE
110
+ table146,1,NULL
111
+ table146,2,http://w3id.org/sepses/resource/cpe#CPE
112
+ table149,0,http://w3id.org/sepses/resource/capec#CAPEC
113
+ table149,1,http://w3id.org/sepses/resource/capec#SkillRequired
114
+ table149,2,http://w3id.org/sepses/resource/capec#Mitigations
115
+ table149,3,http://w3id.org/sepses/resource/capec#Consequences
116
+ table149,4,NULL
117
+ table149,5,NULL
118
+ table149,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
119
+ table149,7,NULL
120
+ table149,8,http://w3id.org/sepses/resource/cwe#CWE
121
+ table15,0,http://w3id.org/sepses/resource/cpe#CPE
122
+ table15,1,http://w3id.org/sepses/resource/cpe#CPE
123
+ table15,2,http://w3id.org/sepses/resource/cpe#productName
124
+ table15,3,NULL
125
+ table15,4,NULL
126
+ table15,5,NULL
127
+ table15,6,http://w3id.org/sepses/resource/cpe#Vendor
128
+ table15,7,http://w3id.org/sepses/resource/cpe#Product
129
+ table15,8,NULL
130
+ table151,0,http://w3id.org/sepses/resource/cwe#CWE
131
+ table151,1,NULL
132
+ table151,2,NULL
133
+ table151,3,NULL
134
+ table151,4,NULL
135
+ table151,5,NULL
136
+ table151,6,NULL
137
+ table151,7,NULL
138
+ table151,8,NULL
139
+ table151,9,http://w3id.org/sepses/resource/capec#CAPEC
140
+ table151,10,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
141
+ table152,0,http://w3id.org/sepses/resource/cwe#CWE
142
+ table152,1,NULL
143
+ table152,2,NULL
144
+ table152,3,NULL
145
+ table153,0,http://w3id.org/sepses/resource/cwe#CWE
146
+ table153,1,NULL
147
+ table159,0,http://w3id.org/sepses/resource/cpe#CPE
148
+ table159,1,NULL
149
+ table160,0,http://w3id.org/sepses/resource/cwe#CWE
150
+ table160,1,NULL
151
+ table160,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
152
+ table160,3,NULL
153
+ table160,4,NULL
154
+ table160,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
155
+ table160,6,NULL
156
+ table160,7,http://w3id.org/sepses/resource/cwe#RelatedWeakness
157
+ table160,8,NULL
158
+ table160,9,NULL
159
+ table162,0,http://w3id.org/sepses/resource/cve#CVE
160
+ table162,1,http://w3id.org/sepses/resource/cpe#Product
161
+ table162,2,http://w3id.org/sepses/resource/capec#CAPEC
162
+ table162,3,http://w3id.org/sepses/resource/cvss#baseSeverity
163
+ table162,4,http://w3id.org/sepses/resource/cwe#CWE
164
+ table164,0,http://w3id.org/sepses/resource/cpe#CPE
165
+ table164,1,NULL
166
+ table164,2,http://w3id.org/sepses/resource/cpe#Product
167
+ table164,3,NULL
168
+ table164,4,http://w3id.org/sepses/resource/cpe#Vendor
169
+ table164,5,http://w3id.org/sepses/resource/cpe#productName
170
+ table168,0,http://w3id.org/sepses/resource/cpe#CPE
171
+ table168,1,NULL
172
+ table168,2,http://w3id.org/sepses/resource/cpe#CPE
173
+ table168,3,http://w3id.org/sepses/resource/cpe#productName
174
+ table171,0,http://w3id.org/sepses/resource/cwe#CWE
175
+ table171,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
176
+ table171,2,NULL
177
+ table171,3,http://w3id.org/sepses/resource/cwe#PotentialMitigation
178
+ table171,4,NULL
179
+ table171,5,NULL
180
+ table172,0,http://w3id.org/sepses/resource/cwe#CWE
181
+ table172,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
182
+ table174,0,http://w3id.org/sepses/resource/cve#CVE
183
+ table174,1,http://w3id.org/sepses/resource/cpe#Vendor
184
+ table174,2,NULL
185
+ table174,3,NULL
186
+ table174,4,NULL
187
+ table176,0,http://w3id.org/sepses/resource/capec#CAPEC
188
+ table176,1,NULL
189
+ table176,2,NULL
190
+ table176,3,NULL
191
+ table176,4,http://w3id.org/sepses/resource/capec#CAPEC
192
+ table176,5,http://w3id.org/sepses/resource/capec#Mitigations
193
+ table176,6,NULL
194
+ table176,7,http://w3id.org/sepses/resource/capec#typicalSeverity
195
+ table176,8,NULL
196
+ table176,9,http://w3id.org/sepses/resource/capec#Consequences
197
+ table178,0,http://w3id.org/sepses/resource/cwe#CWE
198
+ table178,1,NULL
199
+ table178,2,NULL
200
+ table178,3,NULL
201
+ table178,4,NULL
202
+ table178,5,NULL
203
+ table178,6,NULL
204
+ table178,7,http://w3id.org/sepses/resource/cwe#CWE
205
+ table178,8,NULL
206
+ table178,9,http://w3id.org/sepses/resource/cwe#PotentialMitigation
207
+ table178,10,http://w3id.org/sepses/resource/cwe#Reference
208
+ table18,0,http://w3id.org/sepses/resource/cwe#CWE
209
+ table18,1,NULL
210
+ table18,2,http://w3id.org/sepses/resource/cwe#RelatedWeakness
211
+ table18,3,NULL
212
+ table18,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
213
+ table18,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
214
+ table18,6,NULL
215
+ table18,7,NULL
216
+ table18,8,http://w3id.org/sepses/resource/cwe#CommonConsequence
217
+ table182,0,http://w3id.org/sepses/resource/cve#CVE
218
+ table182,1,NULL
219
+ table185,0,http://w3id.org/sepses/resource/capec#CAPEC
220
+ table185,1,http://w3id.org/sepses/resource/capec#SkillRequired
221
+ table185,2,NULL
222
+ table185,3,NULL
223
+ table185,4,NULL
224
+ table186,0,http://w3id.org/sepses/resource/cwe#CWE
225
+ table186,1,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
226
+ table186,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
227
+ table186,3,http://w3id.org/sepses/resource/capec#CAPEC
228
+ table186,4,http://w3id.org/sepses/resource/cwe#Reference
229
+ table186,5,NULL
230
+ table186,6,NULL
231
+ table186,7,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
232
+ table186,8,NULL
233
+ table189,0,http://w3id.org/sepses/resource/capec#CAPEC
234
+ table189,1,http://w3id.org/sepses/resource/capec#CAPEC
235
+ table189,2,NULL
236
+ table189,3,NULL
237
+ table189,4,NULL
238
+ table189,5,NULL
239
+ table189,6,http://w3id.org/sepses/resource/cwe#CWE
240
+ table189,7,NULL
241
+ table19,0,http://w3id.org/sepses/resource/capec#CAPEC
242
+ table19,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
243
+ table19,2,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
244
+ table19,3,NULL
245
+ table19,4,NULL
246
+ table19,5,http://w3id.org/sepses/resource/capec#SkillRequired
247
+ table19,6,NULL
248
+ table19,7,NULL
249
+ table19,8,http://w3id.org/sepses/resource/capec#likehoodOfAttack
250
+ table19,9,http://w3id.org/sepses/resource/capec#Consequences
251
+ table19,10,http://w3id.org/sepses/resource/capec#typicalSeverity
252
+ table190,0,http://w3id.org/sepses/resource/cpe#CPE
253
+ table190,1,http://w3id.org/sepses/resource/cpe#Product
254
+ table190,2,http://w3id.org/sepses/resource/cpe#productName
255
+ table190,3,NULL
256
+ table190,4,NULL
257
+ table191,0,http://w3id.org/sepses/resource/cwe#CWE
258
+ table191,1,NULL
259
+ table191,2,NULL
260
+ table191,3,http://w3id.org/sepses/resource/cwe#Reference
261
+ table191,4,NULL
262
+ table191,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
263
+ table192,0,http://w3id.org/sepses/resource/cwe#CWE
264
+ table192,1,NULL
265
+ table192,2,NULL
266
+ table192,3,NULL
267
+ table192,4,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
268
+ table192,5,NULL
269
+ table192,6,http://w3id.org/sepses/resource/cwe#Reference
270
+ table192,7,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
271
+ table192,8,NULL
272
+ table192,9,http://w3id.org/sepses/resource/cwe#CWE
273
+ table192,10,NULL
274
+ table192,11,NULL
275
+ table193,0,http://w3id.org/sepses/resource/cve#CVE
276
+ table193,1,http://w3id.org/sepses/resource/cwe#CWE
277
+ table193,2,http://w3id.org/sepses/resource/capec#CAPEC
278
+ table194,0,http://w3id.org/sepses/resource/capec#CAPEC
279
+ table194,1,NULL
280
+ table194,2,NULL
281
+ table194,3,http://w3id.org/sepses/resource/capec#ExecutionFlow
282
+ table194,4,http://w3id.org/sepses/resource/capec#Consequences
283
+ table194,5,NULL
284
+ table194,6,http://w3id.org/sepses/resource/cwe#CWE
285
+ table194,7,http://w3id.org/sepses/resource/capec#Mitigations
286
+ table194,8,http://w3id.org/sepses/resource/capec#CAPEC
287
+ table194,9,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
288
+ table195,0,http://w3id.org/sepses/resource/cpe#CPE
289
+ table195,1,NULL
290
+ table196,0,http://w3id.org/sepses/resource/cwe#CWE
291
+ table196,1,http://w3id.org/sepses/resource/cwe#CommonConsequence
292
+ table196,2,NULL
293
+ table196,3,NULL
294
+ table196,4,NULL
295
+ table196,5,NULL
296
+ table196,6,NULL
297
+ table198,0,http://w3id.org/sepses/resource/cwe#CWE
298
+ table198,1,NULL
299
+ table198,2,http://w3id.org/sepses/resource/cwe#CWE
300
+ table198,3,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
301
+ table198,4,NULL
302
+ table198,5,http://w3id.org/sepses/resource/cwe#Reference
303
+ table198,6,NULL
304
+ table198,7,http://w3id.org/sepses/resource/cwe#CommonConsequence
305
+ table198,8,http://w3id.org/sepses/resource/cwe#PotentialMitigation
306
+ table198,9,NULL
307
+ table198,10,NULL
308
+ table198,11,NULL
309
+ table20,0,http://w3id.org/sepses/resource/cve#CVE
310
+ table20,1,http://w3id.org/sepses/resource/capec#CAPEC
311
+ table200,0,http://w3id.org/sepses/resource/cve#CVE
312
+ table200,1,NULL
313
+ table200,2,http://w3id.org/sepses/resource/cpe#vendorName
314
+ table200,3,http://w3id.org/sepses/resource/cwe#CWE
315
+ table200,4,http://w3id.org/sepses/resource/cpe#Vendor
316
+ table200,5,http://w3id.org/sepses/resource/cpe#Product
317
+ table200,6,NULL
318
+ table200,7,http://w3id.org/sepses/resource/capec#CAPEC
319
+ table200,8,NULL
320
+ table200,9,http://w3id.org/sepses/resource/cpe#CPE
321
+ table200,10,http://w3id.org/sepses/resource/cvss#baseSeverity
322
+ table200,11,http://w3id.org/sepses/resource/cve#Reference
323
+ table203,0,http://w3id.org/sepses/resource/capec#CAPEC
324
+ table203,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
325
+ table203,2,NULL
326
+ table203,3,NULL
327
+ table203,4,NULL
328
+ table203,5,http://w3id.org/sepses/resource/capec#Mitigations
329
+ table203,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
330
+ table203,7,http://w3id.org/sepses/resource/capec#CAPEC
331
+ table203,8,NULL
332
+ table203,9,NULL
333
+ table203,10,NULL
334
+ table205,0,http://w3id.org/sepses/resource/cpe#CPE
335
+ table205,1,NULL
336
+ table206,0,http://w3id.org/sepses/resource/capec#CAPEC
337
+ table206,1,http://w3id.org/sepses/resource/capec#CAPEC
338
+ table206,2,http://w3id.org/sepses/resource/capec#Consequences
339
+ table206,3,NULL
340
+ table206,4,NULL
341
+ table206,5,http://w3id.org/sepses/resource/capec#Mitigations
342
+ table206,6,NULL
343
+ table206,7,NULL
344
+ table206,8,NULL
345
+ table206,9,NULL
346
+ table207,0,http://w3id.org/sepses/resource/cve#CVE
347
+ table207,1,http://w3id.org/sepses/resource/cpe#Vendor
348
+ table207,2,NULL
349
+ table207,3,NULL
350
+ table207,4,NULL
351
+ table208,0,http://w3id.org/sepses/resource/capec#CAPEC
352
+ table208,1,http://w3id.org/sepses/resource/capec#CAPEC
353
+ table208,2,NULL
354
+ table208,3,NULL
355
+ table208,4,NULL
356
+ table208,5,NULL
357
+ table208,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
358
+ table208,7,http://w3id.org/sepses/resource/capec#typicalSeverity
359
+ table208,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
360
+ table208,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
361
+ table208,10,NULL
362
+ table208,11,http://w3id.org/sepses/resource/capec#SkillRequired
363
+ table208,12,NULL
364
+ table208,13,NULL
365
+ table208,14,http://w3id.org/sepses/resource/capec#Consequences
366
+ table208,15,http://w3id.org/sepses/resource/capec#Mitigations
367
+ table208,16,NULL
368
+ table208,17,http://w3id.org/sepses/resource/cwe#CWE
369
+ table208,18,NULL
370
+ table208,19,NULL
371
+ table21,0,http://w3id.org/sepses/resource/capec#CAPEC
372
+ table21,1,http://w3id.org/sepses/resource/capec#CAPEC
373
+ table21,2,NULL
374
+ table21,3,NULL
375
+ table21,4,NULL
376
+ table21,5,NULL
377
+ table21,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
378
+ table21,7,http://w3id.org/sepses/resource/capec#typicalSeverity
379
+ table21,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
380
+ table21,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
381
+ table21,10,NULL
382
+ table21,11,http://w3id.org/sepses/resource/capec#SkillRequired
383
+ table21,12,NULL
384
+ table21,13,NULL
385
+ table21,14,http://w3id.org/sepses/resource/capec#Consequences
386
+ table21,15,http://w3id.org/sepses/resource/capec#Mitigations
387
+ table21,16,NULL
388
+ table21,17,http://w3id.org/sepses/resource/cwe#CWE
389
+ table21,18,NULL
390
+ table21,19,NULL
391
+ table212,0,http://w3id.org/sepses/resource/cwe#CWE
392
+ table212,1,http://w3id.org/sepses/resource/cwe#RelatedWeakness
393
+ table212,2,NULL
394
+ table212,3,NULL
395
+ table212,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
396
+ table212,5,NULL
397
+ table212,6,NULL
398
+ table212,7,NULL
399
+ table212,8,NULL
400
+ table212,9,http://w3id.org/sepses/resource/cwe#Reference
401
+ table213,0,http://w3id.org/sepses/resource/cve#CVE
402
+ table213,1,http://w3id.org/sepses/resource/cpe#vendorName
403
+ table214,0,http://w3id.org/sepses/resource/cpe#CPE
404
+ table214,1,http://w3id.org/sepses/resource/cpe#Product
405
+ table214,2,http://w3id.org/sepses/resource/cpe#productName
406
+ table214,3,NULL
407
+ table214,4,NULL
408
+ table216,0,http://w3id.org/sepses/resource/cpe#CPE
409
+ table216,1,NULL
410
+ table216,2,http://w3id.org/sepses/resource/cpe#productName
411
+ table216,3,NULL
412
+ table216,4,NULL
413
+ table217,0,http://w3id.org/sepses/resource/cpe#CPE
414
+ table217,1,NULL
415
+ table218,0,http://w3id.org/sepses/resource/cpe#CPE
416
+ table218,1,NULL
417
+ table218,2,http://w3id.org/sepses/resource/cpe#CPE
418
+ table22,0,http://w3id.org/sepses/resource/capec#CAPEC
419
+ table22,1,http://w3id.org/sepses/resource/capec#CAPEC
420
+ table22,2,http://w3id.org/sepses/resource/capec#typicalSeverity
421
+ table22,3,http://w3id.org/sepses/resource/cwe#CWE
422
+ table22,4,http://w3id.org/sepses/resource/capec#SkillRequired
423
+ table22,5,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
424
+ table22,6,NULL
425
+ table22,7,http://w3id.org/sepses/resource/capec#Consequences
426
+ table22,8,http://w3id.org/sepses/resource/capec#ExecutionFlow
427
+ table221,0,http://w3id.org/sepses/resource/cve#CVE
428
+ table221,1,NULL
429
+ table221,2,http://w3id.org/sepses/resource/cpe#vendorName
430
+ table221,3,http://w3id.org/sepses/resource/cve#Reference
431
+ table223,0,http://w3id.org/sepses/resource/cve#CVE
432
+ table223,1,NULL
433
+ table223,2,http://w3id.org/sepses/resource/cve#Reference
434
+ table223,3,http://w3id.org/sepses/resource/cpe#Product
435
+ table223,4,NULL
436
+ table224,0,http://w3id.org/sepses/resource/cve#CVE
437
+ table224,1,http://w3id.org/sepses/resource/cpe#CPE
438
+ table224,2,NULL
439
+ table224,3,NULL
440
+ table226,0,http://w3id.org/sepses/resource/cpe#CPE
441
+ table226,1,http://w3id.org/sepses/resource/cpe#CPE
442
+ table226,2,http://w3id.org/sepses/resource/cpe#productName
443
+ table226,3,NULL
444
+ table226,4,NULL
445
+ table226,5,NULL
446
+ table226,6,http://w3id.org/sepses/resource/cpe#Vendor
447
+ table226,7,http://w3id.org/sepses/resource/cpe#Product
448
+ table226,8,NULL
449
+ table229,0,http://w3id.org/sepses/resource/cwe#CWE
450
+ table229,1,http://w3id.org/sepses/resource/cwe#Reference
451
+ table229,2,NULL
452
+ table229,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
453
+ table229,4,NULL
454
+ table229,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
455
+ table229,6,NULL
456
+ table229,7,http://w3id.org/sepses/resource/capec#CAPEC
457
+ table229,8,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
458
+ table229,9,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
459
+ table229,10,http://w3id.org/sepses/resource/cwe#RelatedWeakness
460
+ table229,11,NULL
461
+ table229,12,NULL
462
+ table23,0,http://w3id.org/sepses/resource/cve#CVE
463
+ table23,1,NULL
464
+ table23,2,NULL
465
+ table23,3,NULL
466
+ table231,0,http://w3id.org/sepses/resource/cpe#CPE
467
+ table231,1,NULL
468
+ table232,0,http://w3id.org/sepses/resource/cwe#CWE
469
+ table232,1,http://w3id.org/sepses/resource/cwe#Reference
470
+ table232,2,http://w3id.org/sepses/resource/cwe#CWE
471
+ table232,3,http://w3id.org/sepses/resource/cwe#DetectionMethod
472
+ table232,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
473
+ table232,5,NULL
474
+ table232,6,http://w3id.org/sepses/resource/capec#CAPEC
475
+ table232,7,NULL
476
+ table232,8,http://w3id.org/sepses/resource/cwe#RelatedWeakness
477
+ table232,9,NULL
478
+ table232,10,NULL
479
+ table232,11,NULL
480
+ table233,0,http://w3id.org/sepses/resource/cpe#CPE
481
+ table233,1,NULL
482
+ table233,2,http://w3id.org/sepses/resource/cpe#CPE
483
+ table234,0,http://w3id.org/sepses/resource/capec#CAPEC
484
+ table234,1,NULL
485
+ table234,2,NULL
486
+ table234,3,NULL
487
+ table234,4,http://w3id.org/sepses/resource/capec#Consequences
488
+ table238,0,http://w3id.org/sepses/resource/cve#CVE
489
+ table238,1,http://w3id.org/sepses/resource/cpe#Vendor
490
+ table238,2,NULL
491
+ table238,3,NULL
492
+ table238,4,NULL
493
+ table239,0,http://w3id.org/sepses/resource/cwe#CWE
494
+ table239,1,NULL
495
+ table239,2,http://w3id.org/sepses/resource/cwe#CWE
496
+ table239,3,NULL
497
+ table239,4,NULL
498
+ table24,0,http://w3id.org/sepses/resource/cwe#CWE
499
+ table24,1,http://w3id.org/sepses/resource/cwe#DetectionMethod
500
+ table24,2,NULL
501
+ table24,3,NULL
502
+ table24,4,NULL
503
+ table24,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
504
+ table24,6,NULL
505
+ table24,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
506
+ table24,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
507
+ table24,9,NULL
508
+ table240,0,http://w3id.org/sepses/resource/cve#CVE
509
+ table240,1,http://w3id.org/sepses/resource/cvss#baseSeverity
510
+ table241,0,http://w3id.org/sepses/resource/capec#CAPEC
511
+ table241,1,http://w3id.org/sepses/resource/cwe#CWE
512
+ table241,2,http://w3id.org/sepses/resource/capec#ExecutionFlow
513
+ table241,3,NULL
514
+ table241,4,NULL
515
+ table244,0,http://w3id.org/sepses/resource/capec#CAPEC
516
+ table244,1,http://w3id.org/sepses/resource/capec#Consequences
517
+ table244,2,NULL
518
+ table244,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
519
+ table244,4,NULL
520
+ table244,5,NULL
521
+ table244,6,NULL
522
+ table244,7,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
523
+ table244,8,http://w3id.org/sepses/resource/capec#Mitigations
524
+ table244,9,NULL
525
+ table244,10,http://w3id.org/sepses/resource/capec#SkillRequired
526
+ table245,0,http://w3id.org/sepses/resource/capec#CAPEC
527
+ table245,1,NULL
528
+ table245,2,NULL
529
+ table245,3,NULL
530
+ table245,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
531
+ table245,5,NULL
532
+ table246,0,http://w3id.org/sepses/resource/cwe#CWE
533
+ table246,1,NULL
534
+ table246,2,NULL
535
+ table246,3,NULL
536
+ table247,0,http://w3id.org/sepses/resource/capec#CAPEC
537
+ table247,1,NULL
538
+ table247,2,NULL
539
+ table247,3,NULL
540
+ table247,4,http://w3id.org/sepses/resource/cwe#CWE
541
+ table247,5,http://w3id.org/sepses/resource/capec#Consequences
542
+ table247,6,NULL
543
+ table247,7,NULL
544
+ table248,0,http://w3id.org/sepses/resource/capec#CAPEC
545
+ table248,1,http://w3id.org/sepses/resource/capec#SkillRequired
546
+ table248,2,NULL
547
+ table248,3,NULL
548
+ table248,4,NULL
549
+ table248,5,http://w3id.org/sepses/resource/capec#ExecutionFlow
550
+ table248,6,http://w3id.org/sepses/resource/capec#Mitigations
551
+ table248,7,NULL
552
+ table251,0,http://w3id.org/sepses/resource/capec#CAPEC
553
+ table251,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
554
+ table251,2,NULL
555
+ table251,3,NULL
556
+ table251,4,NULL
557
+ table251,5,http://w3id.org/sepses/resource/capec#Mitigations
558
+ table251,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
559
+ table251,7,http://w3id.org/sepses/resource/capec#CAPEC
560
+ table251,8,NULL
561
+ table251,9,NULL
562
+ table251,10,NULL
563
+ table252,0,http://w3id.org/sepses/resource/cpe#CPE
564
+ table252,1,NULL
565
+ table252,2,http://w3id.org/sepses/resource/cpe#productName
566
+ table252,3,http://w3id.org/sepses/resource/cpe#Vendor
567
+ table253,0,http://w3id.org/sepses/resource/cpe#CPE
568
+ table253,1,http://w3id.org/sepses/resource/cpe#CPE
569
+ table253,2,http://w3id.org/sepses/resource/cpe#productName
570
+ table253,3,NULL
571
+ table253,4,NULL
572
+ table253,5,NULL
573
+ table253,6,http://w3id.org/sepses/resource/cpe#Vendor
574
+ table253,7,http://w3id.org/sepses/resource/cpe#Product
575
+ table253,8,NULL
576
+ table254,0,http://w3id.org/sepses/resource/cpe#CPE
577
+ table254,1,NULL
578
+ table254,2,http://w3id.org/sepses/resource/cpe#productName
579
+ table254,3,NULL
580
+ table254,4,http://w3id.org/sepses/resource/cpe#Vendor
581
+ table255,0,http://w3id.org/sepses/resource/cwe#CWE
582
+ table255,1,NULL
583
+ table255,2,NULL
584
+ table255,3,NULL
585
+ table255,4,NULL
586
+ table256,0,http://w3id.org/sepses/resource/cve#CVE
587
+ table256,1,NULL
588
+ table256,2,http://w3id.org/sepses/resource/cpe#vendorName
589
+ table256,3,http://w3id.org/sepses/resource/cve#Reference
590
+ table257,0,http://w3id.org/sepses/resource/capec#CAPEC
591
+ table257,1,NULL
592
+ table257,2,NULL
593
+ table257,3,http://w3id.org/sepses/resource/capec#Mitigations
594
+ table257,4,NULL
595
+ table257,5,http://w3id.org/sepses/resource/capec#CAPEC
596
+ table257,6,http://w3id.org/sepses/resource/capec#ExecutionFlow
597
+ table257,7,NULL
598
+ table257,8,http://w3id.org/sepses/resource/capec#Consequences
599
+ table258,0,http://w3id.org/sepses/resource/cwe#CWE
600
+ table258,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
601
+ table258,2,NULL
602
+ table258,3,http://w3id.org/sepses/resource/cwe#Reference
603
+ table258,4,NULL
604
+ table258,5,NULL
605
+ table258,6,http://w3id.org/sepses/resource/cwe#DetectionMethod
606
+ table258,7,NULL
607
+ table258,8,NULL
608
+ table258,9,NULL
609
+ table258,10,http://w3id.org/sepses/resource/cwe#CommonConsequence
610
+ table258,11,http://w3id.org/sepses/resource/capec#CAPEC
611
+ table259,0,http://w3id.org/sepses/resource/capec#CAPEC
612
+ table259,1,http://w3id.org/sepses/resource/capec#CAPEC
613
+ table259,2,NULL
614
+ table259,3,NULL
615
+ table259,4,NULL
616
+ table259,5,NULL
617
+ table259,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
618
+ table259,7,http://w3id.org/sepses/resource/capec#typicalSeverity
619
+ table259,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
620
+ table259,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
621
+ table259,10,NULL
622
+ table259,11,http://w3id.org/sepses/resource/capec#SkillRequired
623
+ table259,12,NULL
624
+ table259,13,NULL
625
+ table259,14,http://w3id.org/sepses/resource/capec#Consequences
626
+ table259,15,http://w3id.org/sepses/resource/capec#Mitigations
627
+ table259,16,NULL
628
+ table259,17,http://w3id.org/sepses/resource/cwe#CWE
629
+ table259,18,NULL
630
+ table259,19,NULL
631
+ table261,0,http://w3id.org/sepses/resource/cve#CVE
632
+ table261,1,NULL
633
+ table261,2,NULL
634
+ table261,3,http://w3id.org/sepses/resource/cve#Reference
635
+ table261,4,NULL
636
+ table261,5,NULL
637
+ table261,6,NULL
638
+ table263,0,http://w3id.org/sepses/resource/cve#CVE
639
+ table263,1,http://w3id.org/sepses/resource/cpe#vendorName
640
+ table266,0,http://w3id.org/sepses/resource/cwe#CWE
641
+ table266,1,NULL
642
+ table266,2,NULL
643
+ table266,3,NULL
644
+ table266,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
645
+ table266,5,NULL
646
+ table266,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
647
+ table266,7,NULL
648
+ table266,8,NULL
649
+ table267,0,http://w3id.org/sepses/resource/cwe#CWE
650
+ table267,1,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
651
+ table267,2,http://w3id.org/sepses/resource/cwe#CWE
652
+ table267,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
653
+ table267,4,NULL
654
+ table267,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
655
+ table267,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
656
+ table267,7,http://w3id.org/sepses/resource/cwe#Reference
657
+ table268,0,http://w3id.org/sepses/resource/capec#CAPEC
658
+ table268,1,http://w3id.org/sepses/resource/capec#CAPEC
659
+ table268,2,NULL
660
+ table268,3,NULL
661
+ table268,4,NULL
662
+ table268,5,NULL
663
+ table268,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
664
+ table268,7,http://w3id.org/sepses/resource/capec#typicalSeverity
665
+ table268,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
666
+ table268,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
667
+ table268,10,NULL
668
+ table268,11,http://w3id.org/sepses/resource/capec#SkillRequired
669
+ table268,12,NULL
670
+ table268,13,NULL
671
+ table268,14,http://w3id.org/sepses/resource/capec#Consequences
672
+ table268,15,http://w3id.org/sepses/resource/capec#Mitigations
673
+ table268,16,NULL
674
+ table268,17,http://w3id.org/sepses/resource/cwe#CWE
675
+ table268,18,NULL
676
+ table268,19,NULL
677
+ table268,0,http://w3id.org/sepses/resource/cwe#CWE
678
+ table268,1,http://w3id.org/sepses/resource/cwe#CWE
679
+ table268,2,NULL
680
+ table268,3,NULL
681
+ table268,4,NULL
682
+ table268,5,NULL
683
+ table268,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
684
+ table268,7,NULL
685
+ table268,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
686
+ table268,9,NULL
687
+ table268,10,NULL
688
+ table268,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
689
+ table268,12,NULL
690
+ table268,13,NULL
691
+ table268,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
692
+ table268,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
693
+ table268,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
694
+ table268,17,http://w3id.org/sepses/resource/cwe#Reference
695
+ table268,18,NULL
696
+ table268,19,NULL
697
+ table268,20,NULL
698
+ table268,21,http://w3id.org/sepses/resource/capec#CAPEC
699
+ table268,22,NULL
700
+ table269,0,http://w3id.org/sepses/resource/cve#CVE
701
+ table269,1,http://w3id.org/sepses/resource/cpe#Vendor
702
+ table271,0,http://w3id.org/sepses/resource/cwe#CWE
703
+ table271,1,http://w3id.org/sepses/resource/cwe#RelatedWeakness
704
+ table271,2,NULL
705
+ table271,3,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
706
+ table271,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
707
+ table273,0,http://w3id.org/sepses/resource/cve#CVE
708
+ table273,1,http://w3id.org/sepses/resource/cvss#baseSeverity
709
+ table274,0,http://w3id.org/sepses/resource/cpe#CPE
710
+ table274,1,NULL
711
+ table274,2,http://w3id.org/sepses/resource/cpe#CPE
712
+ table274,3,http://w3id.org/sepses/resource/cpe#productName
713
+ table276,0,http://w3id.org/sepses/resource/cve#CVE
714
+ table276,1,NULL
715
+ table276,2,http://w3id.org/sepses/resource/cve#Reference
716
+ table276,3,http://w3id.org/sepses/resource/cpe#Vendor
717
+ table280,0,http://w3id.org/sepses/resource/cwe#CWE
718
+ table280,1,NULL
719
+ table280,2,NULL
720
+ table281,0,http://w3id.org/sepses/resource/cpe#CPE
721
+ table281,1,http://w3id.org/sepses/resource/cpe#Product
722
+ table281,2,http://w3id.org/sepses/resource/cpe#productName
723
+ table281,3,NULL
724
+ table281,4,NULL
725
+ table282,0,http://w3id.org/sepses/resource/capec#CAPEC
726
+ table282,1,NULL
727
+ table282,2,NULL
728
+ table282,3,http://w3id.org/sepses/resource/capec#Mitigations
729
+ table282,4,NULL
730
+ table282,5,http://w3id.org/sepses/resource/cwe#CWE
731
+ table282,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
732
+ table282,7,NULL
733
+ table284,0,http://w3id.org/sepses/resource/cve#CVE
734
+ table284,1,http://w3id.org/sepses/resource/cpe#Vendor
735
+ table284,2,http://w3id.org/sepses/resource/cpe#CPE
736
+ table284,3,http://w3id.org/sepses/resource/cpe#vendorName
737
+ table284,4,NULL
738
+ table284,5,NULL
739
+ table284,6,http://w3id.org/sepses/resource/cve#Reference
740
+ table286,0,http://w3id.org/sepses/resource/capec#CAPEC
741
+ table286,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
742
+ table286,2,NULL
743
+ table286,3,NULL
744
+ table286,4,NULL
745
+ table286,5,http://w3id.org/sepses/resource/capec#likehoodOfAttack
746
+ table286,6,http://w3id.org/sepses/resource/capec#SkillRequired
747
+ table287,0,http://w3id.org/sepses/resource/capec#CAPEC
748
+ table287,1,http://w3id.org/sepses/resource/capec#likehoodOfAttack
749
+ table287,2,NULL
750
+ table287,3,http://w3id.org/sepses/resource/capec#Mitigations
751
+ table287,4,http://w3id.org/sepses/resource/capec#ExecutionFlow
752
+ table287,5,NULL
753
+ table287,6,NULL
754
+ table288,0,http://w3id.org/sepses/resource/cve#CVE
755
+ table288,1,http://w3id.org/sepses/resource/cvss#baseSeverity
756
+ table289,0,http://w3id.org/sepses/resource/cve#CVE
757
+ table289,1,http://w3id.org/sepses/resource/cve#Reference
758
+ table289,2,NULL
759
+ table290,0,http://w3id.org/sepses/resource/cwe#CWE
760
+ table290,1,NULL
761
+ table290,2,NULL
762
+ table290,3,http://w3id.org/sepses/resource/cwe#Reference
763
+ table290,4,NULL
764
+ table290,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
765
+ table290,6,NULL
766
+ table290,7,NULL
767
+ table290,8,NULL
768
+ table290,9,NULL
769
+ table290,10,http://w3id.org/sepses/resource/cwe#DetectionMethod
770
+ table290,11,NULL
771
+ table290,12,NULL
772
+ table292,0,http://w3id.org/sepses/resource/capec#CAPEC
773
+ table292,1,http://w3id.org/sepses/resource/cwe#CWE
774
+ table292,2,http://w3id.org/sepses/resource/capec#Consequences
775
+ table292,3,http://w3id.org/sepses/resource/capec#typicalSeverity
776
+ table292,4,http://w3id.org/sepses/resource/capec#Mitigations
777
+ table292,5,NULL
778
+ table292,6,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
779
+ table292,7,NULL
780
+ table292,8,http://w3id.org/sepses/resource/capec#CAPEC
781
+ table296,0,http://w3id.org/sepses/resource/cve#CVE
782
+ table296,1,http://w3id.org/sepses/resource/cpe#Vendor
783
+ table297,0,http://w3id.org/sepses/resource/cve#CVE
784
+ table297,1,NULL
785
+ table298,0,http://w3id.org/sepses/resource/capec#CAPEC
786
+ table298,1,NULL
787
+ table298,2,NULL
788
+ table298,3,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
789
+ table298,4,NULL
790
+ table298,5,http://w3id.org/sepses/resource/capec#Consequences
791
+ table298,6,http://w3id.org/sepses/resource/capec#SkillRequired
792
+ table298,7,http://w3id.org/sepses/resource/capec#likehoodOfAttack
793
+ table298,8,NULL
794
+ table298,9,NULL
795
+ table298,10,http://w3id.org/sepses/resource/capec#Mitigations
796
+ table30,0,http://w3id.org/sepses/resource/capec#CAPEC
797
+ table30,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
798
+ table30,2,NULL
799
+ table30,3,NULL
800
+ table30,4,NULL
801
+ table30,5,http://w3id.org/sepses/resource/capec#SkillRequired
802
+ table30,6,NULL
803
+ table30,7,http://w3id.org/sepses/resource/capec#typicalSeverity
804
+ table30,8,http://w3id.org/sepses/resource/capec#Mitigations
805
+ table30,9,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
806
+ table30,10,NULL
807
+ table301,0,http://w3id.org/sepses/resource/capec#CAPEC
808
+ table301,1,http://w3id.org/sepses/resource/capec#likehoodOfAttack
809
+ table301,2,NULL
810
+ table301,3,NULL
811
+ table301,0,http://w3id.org/sepses/resource/cwe#CWE
812
+ table301,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
813
+ table301,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
814
+ table301,3,NULL
815
+ table301,4,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
816
+ table301,5,NULL
817
+ table301,6,NULL
818
+ table301,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
819
+ table301,8,NULL
820
+ table301,9,NULL
821
+ table301,10,NULL
822
+ table301,11,NULL
823
+ table301,12,http://w3id.org/sepses/resource/cwe#RelatedWeakness
824
+ table302,0,http://w3id.org/sepses/resource/capec#CAPEC
825
+ table302,1,http://w3id.org/sepses/resource/cwe#CWE
826
+ table302,2,http://w3id.org/sepses/resource/capec#ExecutionFlow
827
+ table302,3,NULL
828
+ table302,4,http://w3id.org/sepses/resource/capec#Mitigations
829
+ table302,5,http://w3id.org/sepses/resource/capec#likehoodOfAttack
830
+ table302,6,NULL
831
+ table302,7,NULL
832
+ table302,8,NULL
833
+ table302,9,NULL
834
+ table302,10,http://w3id.org/sepses/resource/capec#CAPEC
835
+ table303,0,http://w3id.org/sepses/resource/cwe#CWE
836
+ table303,1,http://w3id.org/sepses/resource/capec#CAPEC
837
+ table303,2,NULL
838
+ table303,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
839
+ table303,4,NULL
840
+ table303,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
841
+ table303,6,NULL
842
+ table303,7,NULL
843
+ table304,0,http://w3id.org/sepses/resource/cve#CVE
844
+ table304,1,http://w3id.org/sepses/resource/cvss#baseSeverity
845
+ table305,0,http://w3id.org/sepses/resource/cve#CVE
846
+ table305,1,NULL
847
+ table305,2,http://w3id.org/sepses/resource/cpe#vendorName
848
+ table305,3,http://w3id.org/sepses/resource/cwe#CWE
849
+ table305,4,http://w3id.org/sepses/resource/cpe#Vendor
850
+ table305,5,http://w3id.org/sepses/resource/cpe#Product
851
+ table305,6,NULL
852
+ table305,7,http://w3id.org/sepses/resource/capec#CAPEC
853
+ table305,8,NULL
854
+ table305,9,http://w3id.org/sepses/resource/cpe#CPE
855
+ table305,10,http://w3id.org/sepses/resource/cvss#baseSeverity
856
+ table305,11,http://w3id.org/sepses/resource/cve#Reference
857
+ table307,0,http://w3id.org/sepses/resource/cve#CVE
858
+ table307,1,http://w3id.org/sepses/resource/cwe#CWE
859
+ table307,2,http://w3id.org/sepses/resource/cpe#Vendor
860
+ table310,0,http://w3id.org/sepses/resource/cpe#CPE
861
+ table310,1,NULL
862
+ table310,2,NULL
863
+ table311,0,http://w3id.org/sepses/resource/cpe#CPE
864
+ table311,1,NULL
865
+ table312,0,http://w3id.org/sepses/resource/capec#CAPEC
866
+ table312,1,http://w3id.org/sepses/resource/capec#Consequences
867
+ table312,2,NULL
868
+ table312,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
869
+ table314,0,http://w3id.org/sepses/resource/cve#CVE
870
+ table314,1,http://w3id.org/sepses/resource/cwe#CWE
871
+ table314,2,http://w3id.org/sepses/resource/capec#CAPEC
872
+ table314,3,http://w3id.org/sepses/resource/cpe#Vendor
873
+ table315,0,http://w3id.org/sepses/resource/cwe#CWE
874
+ table315,1,NULL
875
+ table318,0,http://w3id.org/sepses/resource/cpe#CPE
876
+ table318,1,http://w3id.org/sepses/resource/cpe#Product
877
+ table318,2,http://w3id.org/sepses/resource/cpe#productName
878
+ table318,3,NULL
879
+ table318,4,NULL
880
+ table319,0,http://w3id.org/sepses/resource/cwe#CWE
881
+ table319,1,NULL
882
+ table319,2,NULL
883
+ table319,3,NULL
884
+ table319,4,NULL
885
+ table325,0,http://w3id.org/sepses/resource/capec#CAPEC
886
+ table325,1,http://w3id.org/sepses/resource/capec#SkillRequired
887
+ table325,2,NULL
888
+ table325,3,NULL
889
+ table326,0,http://w3id.org/sepses/resource/cpe#CPE
890
+ table326,1,http://w3id.org/sepses/resource/cpe#Product
891
+ table326,2,http://w3id.org/sepses/resource/cpe#productName
892
+ table326,3,NULL
893
+ table330,0,http://w3id.org/sepses/resource/cve#CVE
894
+ table330,1,NULL
895
+ table330,2,http://w3id.org/sepses/resource/cpe#vendorName
896
+ table330,3,http://w3id.org/sepses/resource/cwe#CWE
897
+ table330,4,http://w3id.org/sepses/resource/cpe#Vendor
898
+ table330,5,http://w3id.org/sepses/resource/cpe#Product
899
+ table330,6,NULL
900
+ table330,7,http://w3id.org/sepses/resource/capec#CAPEC
901
+ table330,8,NULL
902
+ table330,9,http://w3id.org/sepses/resource/cpe#CPE
903
+ table330,10,http://w3id.org/sepses/resource/cvss#baseSeverity
904
+ table330,11,http://w3id.org/sepses/resource/cve#Reference
905
+ table331,0,http://w3id.org/sepses/resource/cve#CVE
906
+ table331,1,http://w3id.org/sepses/resource/cwe#CWE
907
+ table331,2,NULL
908
+ table331,3,NULL
909
+ table331,4,http://w3id.org/sepses/resource/cpe#Product
910
+ table332,0,http://w3id.org/sepses/resource/cwe#CWE
911
+ table332,1,http://w3id.org/sepses/resource/cwe#CWE
912
+ table332,2,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
913
+ table332,3,NULL
914
+ table332,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
915
+ table332,5,NULL
916
+ table332,6,NULL
917
+ table332,7,http://w3id.org/sepses/resource/capec#CAPEC
918
+ table332,8,NULL
919
+ table332,9,http://w3id.org/sepses/resource/cwe#CommonConsequence
920
+ table335,0,http://w3id.org/sepses/resource/capec#CAPEC
921
+ table335,1,NULL
922
+ table335,2,NULL
923
+ table335,3,http://w3id.org/sepses/resource/capec#Consequences
924
+ table335,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
925
+ table335,5,NULL
926
+ table335,6,http://w3id.org/sepses/resource/capec#Mitigations
927
+ table335,7,http://w3id.org/sepses/resource/capec#CAPEC
928
+ table335,8,http://w3id.org/sepses/resource/cwe#CWE
929
+ table335,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
930
+ table339,0,http://w3id.org/sepses/resource/capec#CAPEC
931
+ table339,1,http://w3id.org/sepses/resource/capec#typicalSeverity
932
+ table339,2,NULL
933
+ table339,3,NULL
934
+ table339,4,http://w3id.org/sepses/resource/capec#ExecutionFlow
935
+ table339,5,NULL
936
+ table339,6,http://w3id.org/sepses/resource/capec#CAPEC
937
+ table339,7,NULL
938
+ table339,8,NULL
939
+ table340,0,http://w3id.org/sepses/resource/cpe#CPE
940
+ table340,1,http://w3id.org/sepses/resource/cpe#Vendor
941
+ table340,2,NULL
942
+ table340,3,http://w3id.org/sepses/resource/cpe#CPE
943
+ table340,4,http://w3id.org/sepses/resource/cpe#Product
944
+ table341,0,http://w3id.org/sepses/resource/capec#CAPEC
945
+ table341,1,NULL
946
+ table343,0,http://w3id.org/sepses/resource/cpe#CPE
947
+ table343,1,NULL
948
+ table343,2,NULL
949
+ table343,3,http://w3id.org/sepses/resource/cpe#Product
950
+ table343,4,http://w3id.org/sepses/resource/cpe#Vendor
951
+ table343,5,NULL
952
+ table344,0,http://w3id.org/sepses/resource/cpe#CPE
953
+ table344,1,http://w3id.org/sepses/resource/cpe#CPE
954
+ table344,2,http://w3id.org/sepses/resource/cpe#productName
955
+ table344,3,NULL
956
+ table344,4,NULL
957
+ table344,5,NULL
958
+ table344,6,http://w3id.org/sepses/resource/cpe#Vendor
959
+ table344,7,http://w3id.org/sepses/resource/cpe#Product
960
+ table344,8,NULL
961
+ table345,0,http://w3id.org/sepses/resource/cwe#CWE
962
+ table345,1,NULL
963
+ table345,2,http://w3id.org/sepses/resource/capec#CAPEC
964
+ table345,3,NULL
965
+ table345,4,http://w3id.org/sepses/resource/cwe#DetectionMethod
966
+ table345,5,NULL
967
+ table345,6,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
968
+ table345,7,NULL
969
+ table345,8,NULL
970
+ table345,9,NULL
971
+ table345,10,http://w3id.org/sepses/resource/cwe#Reference
972
+ table347,0,http://w3id.org/sepses/resource/cve#CVE
973
+ table347,1,http://w3id.org/sepses/resource/cpe#Vendor
974
+ table347,2,NULL
975
+ table347,3,NULL
976
+ table347,4,NULL
977
+ table348,0,http://w3id.org/sepses/resource/cwe#CWE
978
+ table348,1,NULL
979
+ table348,2,NULL
980
+ table348,3,http://w3id.org/sepses/resource/cwe#PotentialMitigation
981
+ table348,4,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
982
+ table348,5,NULL
983
+ table348,6,NULL
984
+ table348,7,http://w3id.org/sepses/resource/cwe#Reference
985
+ table348,8,http://w3id.org/sepses/resource/cwe#CWE
986
+ table348,9,NULL
987
+ table348,10,http://w3id.org/sepses/resource/cwe#DetectionMethod
988
+ table349,0,http://w3id.org/sepses/resource/capec#CAPEC
989
+ table349,1,NULL
990
+ table349,2,NULL
991
+ table349,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
992
+ table349,4,http://w3id.org/sepses/resource/capec#Mitigations
993
+ table349,5,http://w3id.org/sepses/resource/capec#CAPEC
994
+ table349,6,http://w3id.org/sepses/resource/cwe#CWE
995
+ table349,7,http://w3id.org/sepses/resource/capec#Consequences
996
+ table349,8,NULL
997
+ table350,0,http://w3id.org/sepses/resource/cve#CVE
998
+ table350,1,http://w3id.org/sepses/resource/cvss#baseSeverity
999
+ table352,0,http://w3id.org/sepses/resource/cwe#CWE
1000
+ table352,1,NULL
1001
+ table352,2,NULL
1002
+ table352,3,NULL
1003
+ table352,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
1004
+ table352,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1005
+ table353,0,http://w3id.org/sepses/resource/cve#CVE
1006
+ table353,1,http://w3id.org/sepses/resource/cwe#CWE
1007
+ table354,0,http://w3id.org/sepses/resource/cpe#CPE
1008
+ table354,1,NULL
1009
+ table354,2,http://w3id.org/sepses/resource/cpe#Product
1010
+ table354,3,NULL
1011
+ table354,4,NULL
1012
+ table354,5,http://w3id.org/sepses/resource/cpe#productName
1013
+ table357,0,http://w3id.org/sepses/resource/capec#CAPEC
1014
+ table357,1,NULL
1015
+ table357,2,NULL
1016
+ table357,3,NULL
1017
+ table357,4,NULL
1018
+ table357,5,NULL
1019
+ table357,6,http://w3id.org/sepses/resource/capec#Consequences
1020
+ table357,7,http://w3id.org/sepses/resource/cwe#CWE
1021
+ table357,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1022
+ table357,9,http://w3id.org/sepses/resource/capec#CAPEC
1023
+ table358,0,http://w3id.org/sepses/resource/capec#CAPEC
1024
+ table358,1,NULL
1025
+ table358,0,http://w3id.org/sepses/resource/cwe#CWE
1026
+ table358,1,NULL
1027
+ table359,0,http://w3id.org/sepses/resource/cwe#CWE
1028
+ table359,1,http://w3id.org/sepses/resource/cwe#CWE
1029
+ table359,2,NULL
1030
+ table359,3,NULL
1031
+ table359,4,NULL
1032
+ table359,5,NULL
1033
+ table359,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1034
+ table359,7,NULL
1035
+ table359,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1036
+ table359,9,NULL
1037
+ table359,10,NULL
1038
+ table359,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1039
+ table359,12,NULL
1040
+ table359,13,NULL
1041
+ table359,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
1042
+ table359,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
1043
+ table359,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1044
+ table359,17,http://w3id.org/sepses/resource/cwe#Reference
1045
+ table359,18,NULL
1046
+ table359,19,NULL
1047
+ table359,20,NULL
1048
+ table359,21,http://w3id.org/sepses/resource/capec#CAPEC
1049
+ table359,22,NULL
1050
+ table360,0,http://w3id.org/sepses/resource/cwe#CWE
1051
+ table360,1,NULL
1052
+ table360,2,NULL
1053
+ table361,0,http://w3id.org/sepses/resource/cwe#CWE
1054
+ table361,1,NULL
1055
+ table361,2,http://w3id.org/sepses/resource/cwe#CWE
1056
+ table361,3,NULL
1057
+ table361,4,NULL
1058
+ table362,0,http://w3id.org/sepses/resource/capec#CAPEC
1059
+ table362,1,http://w3id.org/sepses/resource/capec#typicalSeverity
1060
+ table362,2,NULL
1061
+ table362,3,NULL
1062
+ table362,4,NULL
1063
+ table362,5,NULL
1064
+ table362,6,NULL
1065
+ table364,0,http://w3id.org/sepses/resource/cwe#CWE
1066
+ table364,1,NULL
1067
+ table364,2,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1068
+ table364,3,NULL
1069
+ table364,4,http://w3id.org/sepses/resource/capec#CAPEC
1070
+ table364,5,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1071
+ table364,6,http://w3id.org/sepses/resource/cwe#CWE
1072
+ table364,7,NULL
1073
+ table364,8,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1074
+ table364,9,NULL
1075
+ table364,10,NULL
1076
+ table364,11,NULL
1077
+ table367,0,http://w3id.org/sepses/resource/cwe#CWE
1078
+ table367,1,NULL
1079
+ table367,2,http://w3id.org/sepses/resource/cwe#CWE
1080
+ table368,0,http://w3id.org/sepses/resource/cwe#CWE
1081
+ table368,1,NULL
1082
+ table368,2,NULL
1083
+ table368,3,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1084
+ table368,4,NULL
1085
+ table368,5,NULL
1086
+ table368,6,http://w3id.org/sepses/resource/cwe#Reference
1087
+ table368,7,NULL
1088
+ table368,8,http://w3id.org/sepses/resource/cwe#CommonConsequence
1089
+ table368,9,http://w3id.org/sepses/resource/capec#CAPEC
1090
+ table369,0,http://w3id.org/sepses/resource/cwe#CWE
1091
+ table369,1,NULL
1092
+ table370,0,http://w3id.org/sepses/resource/cwe#CWE
1093
+ table370,1,NULL
1094
+ table370,2,NULL
1095
+ table370,3,NULL
1096
+ table370,4,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1097
+ table370,5,NULL
1098
+ table370,6,NULL
1099
+ table371,0,http://w3id.org/sepses/resource/cwe#CWE
1100
+ table371,1,http://w3id.org/sepses/resource/cwe#CWE
1101
+ table371,2,NULL
1102
+ table371,3,NULL
1103
+ table371,4,NULL
1104
+ table371,5,NULL
1105
+ table371,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1106
+ table371,7,NULL
1107
+ table371,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1108
+ table371,9,NULL
1109
+ table371,10,NULL
1110
+ table371,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1111
+ table371,12,NULL
1112
+ table371,13,NULL
1113
+ table371,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
1114
+ table371,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
1115
+ table371,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1116
+ table371,17,http://w3id.org/sepses/resource/cwe#Reference
1117
+ table371,18,NULL
1118
+ table371,19,NULL
1119
+ table371,20,NULL
1120
+ table371,21,http://w3id.org/sepses/resource/capec#CAPEC
1121
+ table371,22,NULL
1122
+ table372,0,http://w3id.org/sepses/resource/capec#CAPEC
1123
+ table372,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
1124
+ table373,0,http://w3id.org/sepses/resource/capec#CAPEC
1125
+ table373,1,NULL
1126
+ table373,2,http://w3id.org/sepses/resource/cwe#CWE
1127
+ table373,3,NULL
1128
+ table373,4,http://w3id.org/sepses/resource/capec#CAPEC
1129
+ table375,0,http://w3id.org/sepses/resource/cve#CVE
1130
+ table375,1,http://w3id.org/sepses/resource/cve#Reference
1131
+ table378,0,http://w3id.org/sepses/resource/cwe#CWE
1132
+ table378,1,NULL
1133
+ table379,0,http://w3id.org/sepses/resource/cve#CVE
1134
+ table379,1,http://w3id.org/sepses/resource/cve#Reference
1135
+ table379,2,http://w3id.org/sepses/resource/cvss#baseSeverity
1136
+ table379,3,NULL
1137
+ table379,4,http://w3id.org/sepses/resource/cpe#Product
1138
+ table380,0,http://w3id.org/sepses/resource/cpe#CPE
1139
+ table380,1,NULL
1140
+ table382,0,http://w3id.org/sepses/resource/cpe#CPE
1141
+ table382,1,http://w3id.org/sepses/resource/cpe#CPE
1142
+ table382,2,NULL
1143
+ table382,3,NULL
1144
+ table382,4,NULL
1145
+ table383,0,http://w3id.org/sepses/resource/cpe#CPE
1146
+ table383,1,http://w3id.org/sepses/resource/cpe#Product
1147
+ table383,2,NULL
1148
+ table383,3,NULL
1149
+ table383,4,NULL
1150
+ table385,0,http://w3id.org/sepses/resource/cwe#CWE
1151
+ table385,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1152
+ table385,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
1153
+ table385,3,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1154
+ table385,4,NULL
1155
+ table385,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
1156
+ table386,0,http://w3id.org/sepses/resource/cve#CVE
1157
+ table386,1,NULL
1158
+ table387,0,http://w3id.org/sepses/resource/capec#CAPEC
1159
+ table387,1,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1160
+ table387,2,NULL
1161
+ table387,3,NULL
1162
+ table387,4,http://w3id.org/sepses/resource/capec#CAPEC
1163
+ table387,5,http://w3id.org/sepses/resource/cwe#CWE
1164
+ table387,6,http://w3id.org/sepses/resource/capec#SkillRequired
1165
+ table387,7,NULL
1166
+ table387,8,http://w3id.org/sepses/resource/capec#Consequences
1167
+ table387,9,NULL
1168
+ table387,10,NULL
1169
+ table388,0,http://w3id.org/sepses/resource/cwe#CWE
1170
+ table388,1,NULL
1171
+ table388,2,NULL
1172
+ table388,3,NULL
1173
+ table388,4,NULL
1174
+ table388,5,NULL
1175
+ table388,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1176
+ table388,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1177
+ table390,0,http://w3id.org/sepses/resource/cve#CVE
1178
+ table390,1,http://w3id.org/sepses/resource/cpe#Vendor
1179
+ table393,0,http://w3id.org/sepses/resource/capec#CAPEC
1180
+ table393,1,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1181
+ table395,0,http://w3id.org/sepses/resource/cwe#CWE
1182
+ table395,1,NULL
1183
+ table395,2,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1184
+ table395,3,NULL
1185
+ table395,4,NULL
1186
+ table395,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1187
+ table395,6,http://w3id.org/sepses/resource/capec#CAPEC
1188
+ table395,7,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1189
+ table395,8,NULL
1190
+ table395,9,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1191
+ table395,10,NULL
1192
+ table396,0,http://w3id.org/sepses/resource/cpe#CPE
1193
+ table396,1,NULL
1194
+ table397,0,http://w3id.org/sepses/resource/cwe#CWE
1195
+ table397,1,NULL
1196
+ table397,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1197
+ table397,3,NULL
1198
+ table397,4,NULL
1199
+ table397,5,NULL
1200
+ table397,6,NULL
1201
+ table397,7,NULL
1202
+ table399,0,http://w3id.org/sepses/resource/cpe#CPE
1203
+ table399,1,NULL
1204
+ table399,2,http://w3id.org/sepses/resource/cpe#CPE
1205
+ table399,3,http://w3id.org/sepses/resource/cpe#productName
1206
+ table400,0,http://w3id.org/sepses/resource/cpe#CPE
1207
+ table400,1,NULL
1208
+ table400,2,NULL
1209
+ table400,3,NULL
1210
+ table400,4,http://w3id.org/sepses/resource/cpe#Vendor
1211
+ table401,0,http://w3id.org/sepses/resource/cpe#CPE
1212
+ table401,1,http://w3id.org/sepses/resource/cpe#Product
1213
+ table401,2,http://w3id.org/sepses/resource/cpe#Vendor
1214
+ table401,3,NULL
1215
+ table401,4,NULL
1216
+ table403,0,http://w3id.org/sepses/resource/cpe#CPE
1217
+ table403,1,NULL
1218
+ table403,2,NULL
1219
+ table403,3,http://w3id.org/sepses/resource/cpe#Vendor
1220
+ table403,4,NULL
1221
+ table403,5,http://w3id.org/sepses/resource/cpe#CPE
1222
+ table404,0,http://w3id.org/sepses/resource/cpe#CPE
1223
+ table404,1,NULL
1224
+ table404,2,NULL
1225
+ table405,0,http://w3id.org/sepses/resource/cve#CVE
1226
+ table405,1,NULL
1227
+ table405,2,NULL
1228
+ table405,3,http://w3id.org/sepses/resource/cve#Reference
1229
+ table405,4,NULL
1230
+ table405,5,NULL
1231
+ table405,6,NULL
1232
+ table406,0,http://w3id.org/sepses/resource/capec#CAPEC
1233
+ table406,1,NULL
1234
+ table406,2,http://w3id.org/sepses/resource/capec#Mitigations
1235
+ table406,3,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1236
+ table406,4,NULL
1237
+ table406,5,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1238
+ table407,0,http://w3id.org/sepses/resource/cwe#CWE
1239
+ table407,1,NULL
1240
+ table408,0,http://w3id.org/sepses/resource/cve#CVE
1241
+ table408,1,NULL
1242
+ table408,2,http://w3id.org/sepses/resource/cpe#vendorName
1243
+ table408,3,http://w3id.org/sepses/resource/cwe#CWE
1244
+ table408,4,http://w3id.org/sepses/resource/cpe#Vendor
1245
+ table408,5,http://w3id.org/sepses/resource/cpe#Product
1246
+ table408,6,NULL
1247
+ table408,7,http://w3id.org/sepses/resource/capec#CAPEC
1248
+ table408,8,NULL
1249
+ table408,9,http://w3id.org/sepses/resource/cpe#CPE
1250
+ table408,10,http://w3id.org/sepses/resource/cvss#baseSeverity
1251
+ table408,11,http://w3id.org/sepses/resource/cve#Reference
1252
+ table410,0,http://w3id.org/sepses/resource/cve#CVE
1253
+ table410,1,http://w3id.org/sepses/resource/cve#Reference
1254
+ table410,2,http://w3id.org/sepses/resource/capec#CAPEC
1255
+ table410,3,http://w3id.org/sepses/resource/cwe#CWE
1256
+ table410,4,http://w3id.org/sepses/resource/cpe#Product
1257
+ table410,5,NULL
1258
+ table410,6,http://w3id.org/sepses/resource/cvss#baseSeverity
1259
+ table411,0,http://w3id.org/sepses/resource/cwe#CWE
1260
+ table411,1,NULL
1261
+ table411,2,http://w3id.org/sepses/resource/cwe#CWE
1262
+ table411,3,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1263
+ table411,4,NULL
1264
+ table411,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
1265
+ table412,0,http://w3id.org/sepses/resource/capec#CAPEC
1266
+ table412,1,http://w3id.org/sepses/resource/capec#CAPEC
1267
+ table412,2,http://w3id.org/sepses/resource/capec#typicalSeverity
1268
+ table412,3,NULL
1269
+ table412,4,NULL
1270
+ table412,5,NULL
1271
+ table412,6,NULL
1272
+ table412,7,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1273
+ table412,8,http://w3id.org/sepses/resource/cwe#CWE
1274
+ table412,9,http://w3id.org/sepses/resource/capec#Consequences
1275
+ table412,0,http://w3id.org/sepses/resource/cwe#CWE
1276
+ table412,1,NULL
1277
+ table413,0,http://w3id.org/sepses/resource/cwe#CWE
1278
+ table413,1,NULL
1279
+ table413,2,http://w3id.org/sepses/resource/cwe#CWE
1280
+ table413,3,NULL
1281
+ table413,4,NULL
1282
+ table413,5,NULL
1283
+ table413,6,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1284
+ table413,7,NULL
1285
+ table413,8,http://w3id.org/sepses/resource/cwe#DetectionMethod
1286
+ table413,9,NULL
1287
+ table414,0,http://w3id.org/sepses/resource/cve#CVE
1288
+ table414,1,http://w3id.org/sepses/resource/cpe#Vendor
1289
+ table414,2,NULL
1290
+ table414,3,NULL
1291
+ table414,4,NULL
1292
+ table417,0,http://w3id.org/sepses/resource/cwe#CWE
1293
+ table417,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1294
+ table417,2,NULL
1295
+ table417,3,NULL
1296
+ table418,0,http://w3id.org/sepses/resource/cwe#CWE
1297
+ table418,1,http://w3id.org/sepses/resource/cwe#Reference
1298
+ table418,2,http://w3id.org/sepses/resource/cwe#CommonConsequence
1299
+ table418,3,NULL
1300
+ table418,4,NULL
1301
+ table418,5,NULL
1302
+ table418,6,NULL
1303
+ table418,7,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1304
+ table418,8,http://w3id.org/sepses/resource/capec#CAPEC
1305
+ table418,9,NULL
1306
+ table418,10,NULL
1307
+ table418,11,NULL
1308
+ table419,0,http://w3id.org/sepses/resource/capec#CAPEC
1309
+ table419,1,NULL
1310
+ table419,2,http://w3id.org/sepses/resource/capec#SkillRequired
1311
+ table419,3,http://w3id.org/sepses/resource/capec#CAPEC
1312
+ table419,4,http://w3id.org/sepses/resource/cwe#CWE
1313
+ table419,5,http://w3id.org/sepses/resource/capec#typicalSeverity
1314
+ table419,6,NULL
1315
+ table419,7,NULL
1316
+ table42,0,http://w3id.org/sepses/resource/cwe#CWE
1317
+ table42,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1318
+ table42,2,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1319
+ table42,3,http://w3id.org/sepses/resource/capec#CAPEC
1320
+ table42,4,NULL
1321
+ table42,5,http://w3id.org/sepses/resource/cwe#DetectionMethod
1322
+ table42,6,NULL
1323
+ table42,7,NULL
1324
+ table42,8,NULL
1325
+ table42,9,NULL
1326
+ table42,10,http://w3id.org/sepses/resource/cwe#Reference
1327
+ table420,0,http://w3id.org/sepses/resource/cwe#CWE
1328
+ table420,1,NULL
1329
+ table420,2,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1330
+ table420,3,http://w3id.org/sepses/resource/cwe#Reference
1331
+ table421,0,http://w3id.org/sepses/resource/cve#CVE
1332
+ table421,1,NULL
1333
+ table421,2,http://w3id.org/sepses/resource/cpe#vendorName
1334
+ table421,3,http://w3id.org/sepses/resource/cwe#CWE
1335
+ table421,4,http://w3id.org/sepses/resource/cpe#Vendor
1336
+ table421,5,http://w3id.org/sepses/resource/cpe#Product
1337
+ table421,6,NULL
1338
+ table421,7,http://w3id.org/sepses/resource/capec#CAPEC
1339
+ table421,8,NULL
1340
+ table421,9,http://w3id.org/sepses/resource/cpe#CPE
1341
+ table421,10,http://w3id.org/sepses/resource/cvss#baseSeverity
1342
+ table421,11,http://w3id.org/sepses/resource/cve#Reference
1343
+ table422,0,http://w3id.org/sepses/resource/cve#CVE
1344
+ table422,1,NULL
1345
+ table422,2,http://w3id.org/sepses/resource/cpe#vendorName
1346
+ table422,3,http://w3id.org/sepses/resource/cwe#CWE
1347
+ table422,4,http://w3id.org/sepses/resource/cpe#Vendor
1348
+ table422,5,http://w3id.org/sepses/resource/cpe#Product
1349
+ table422,6,NULL
1350
+ table422,7,http://w3id.org/sepses/resource/capec#CAPEC
1351
+ table422,8,NULL
1352
+ table422,9,http://w3id.org/sepses/resource/cpe#CPE
1353
+ table422,10,http://w3id.org/sepses/resource/cvss#baseSeverity
1354
+ table422,11,http://w3id.org/sepses/resource/cve#Reference
1355
+ table423,0,http://w3id.org/sepses/resource/capec#CAPEC
1356
+ table423,1,NULL
1357
+ table423,2,NULL
1358
+ table423,3,NULL
1359
+ table423,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1360
+ table423,5,NULL
1361
+ table424,0,http://w3id.org/sepses/resource/cpe#CPE
1362
+ table424,1,NULL
1363
+ table424,2,http://w3id.org/sepses/resource/cpe#CPE
1364
+ table424,3,http://w3id.org/sepses/resource/cpe#productName
1365
+ table425,0,http://w3id.org/sepses/resource/cwe#CWE
1366
+ table425,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1367
+ table426,0,http://w3id.org/sepses/resource/capec#CAPEC
1368
+ table426,1,NULL
1369
+ table426,2,NULL
1370
+ table426,3,NULL
1371
+ table426,4,http://w3id.org/sepses/resource/capec#Consequences
1372
+ table427,0,http://w3id.org/sepses/resource/cve#CVE
1373
+ table427,1,NULL
1374
+ table427,2,NULL
1375
+ table427,3,NULL
1376
+ table428,0,http://w3id.org/sepses/resource/cve#CVE
1377
+ table428,1,NULL
1378
+ table428,2,http://w3id.org/sepses/resource/cpe#vendorName
1379
+ table428,3,http://w3id.org/sepses/resource/cwe#CWE
1380
+ table428,4,http://w3id.org/sepses/resource/cpe#Vendor
1381
+ table428,5,http://w3id.org/sepses/resource/cpe#Product
1382
+ table428,6,NULL
1383
+ table428,7,http://w3id.org/sepses/resource/capec#CAPEC
1384
+ table428,8,NULL
1385
+ table428,9,http://w3id.org/sepses/resource/cpe#CPE
1386
+ table428,10,http://w3id.org/sepses/resource/cvss#baseSeverity
1387
+ table428,11,http://w3id.org/sepses/resource/cve#Reference
1388
+ table429,0,http://w3id.org/sepses/resource/capec#CAPEC
1389
+ table429,1,NULL
1390
+ table429,2,NULL
1391
+ table429,3,NULL
1392
+ table429,4,http://w3id.org/sepses/resource/capec#CAPEC
1393
+ table429,5,NULL
1394
+ table429,6,http://w3id.org/sepses/resource/capec#SkillRequired
1395
+ table429,7,http://w3id.org/sepses/resource/capec#Mitigations
1396
+ table43,0,http://w3id.org/sepses/resource/capec#CAPEC
1397
+ table43,1,NULL
1398
+ table43,2,http://w3id.org/sepses/resource/capec#CAPEC
1399
+ table43,3,http://w3id.org/sepses/resource/capec#Consequences
1400
+ table43,4,NULL
1401
+ table431,0,http://w3id.org/sepses/resource/cpe#CPE
1402
+ table431,1,NULL
1403
+ table431,2,http://w3id.org/sepses/resource/cpe#CPE
1404
+ table431,3,http://w3id.org/sepses/resource/cpe#productName
1405
+ table432,0,http://w3id.org/sepses/resource/cpe#CPE
1406
+ table432,1,http://w3id.org/sepses/resource/cpe#CPE
1407
+ table432,2,http://w3id.org/sepses/resource/cpe#productName
1408
+ table432,3,NULL
1409
+ table432,4,NULL
1410
+ table432,5,NULL
1411
+ table432,6,http://w3id.org/sepses/resource/cpe#Vendor
1412
+ table432,7,http://w3id.org/sepses/resource/cpe#Product
1413
+ table432,8,NULL
1414
+ table433,0,http://w3id.org/sepses/resource/capec#CAPEC
1415
+ table433,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
1416
+ table434,0,http://w3id.org/sepses/resource/cve#CVE
1417
+ table434,1,http://w3id.org/sepses/resource/cpe#Product
1418
+ table434,2,http://w3id.org/sepses/resource/cvss#baseSeverity
1419
+ table434,3,http://w3id.org/sepses/resource/cpe#CPE
1420
+ table434,4,NULL
1421
+ table435,0,http://w3id.org/sepses/resource/cve#CVE
1422
+ table435,1,http://w3id.org/sepses/resource/cpe#Product
1423
+ table435,2,http://w3id.org/sepses/resource/cpe#CPE
1424
+ table435,3,NULL
1425
+ table436,0,http://w3id.org/sepses/resource/cve#CVE
1426
+ table436,1,http://w3id.org/sepses/resource/cpe#CPE
1427
+ table436,2,http://w3id.org/sepses/resource/cwe#CWE
1428
+ table436,3,NULL
1429
+ table436,4,NULL
1430
+ table437,0,http://w3id.org/sepses/resource/cpe#CPE
1431
+ table437,1,NULL
1432
+ table438,0,http://w3id.org/sepses/resource/cve#CVE
1433
+ table438,1,http://w3id.org/sepses/resource/cvss#baseSeverity
1434
+ table438,2,http://w3id.org/sepses/resource/cpe#Vendor
1435
+ table438,3,http://w3id.org/sepses/resource/cpe#CPE
1436
+ table438,4,NULL
1437
+ table438,5,http://w3id.org/sepses/resource/cwe#CWE
1438
+ table438,6,NULL
1439
+ table439,0,http://w3id.org/sepses/resource/cve#CVE
1440
+ table439,1,http://w3id.org/sepses/resource/cwe#CWE
1441
+ table439,2,NULL
1442
+ table439,3,http://w3id.org/sepses/resource/cpe#Product
1443
+ table44,0,http://w3id.org/sepses/resource/cpe#CPE
1444
+ table44,1,NULL
1445
+ table44,2,http://w3id.org/sepses/resource/cpe#productName
1446
+ table440,0,http://w3id.org/sepses/resource/cwe#CWE
1447
+ table440,1,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1448
+ table440,2,NULL
1449
+ table440,3,http://w3id.org/sepses/resource/cwe#DetectionMethod
1450
+ table440,4,NULL
1451
+ table440,5,NULL
1452
+ table440,6,http://w3id.org/sepses/resource/cwe#Reference
1453
+ table440,7,NULL
1454
+ table441,0,http://w3id.org/sepses/resource/cpe#CPE
1455
+ table441,1,http://w3id.org/sepses/resource/cpe#Product
1456
+ table441,2,http://w3id.org/sepses/resource/cpe#productName
1457
+ table441,3,NULL
1458
+ table441,4,NULL
1459
+ table442,0,http://w3id.org/sepses/resource/capec#CAPEC
1460
+ table442,1,http://w3id.org/sepses/resource/capec#CAPEC
1461
+ table442,2,NULL
1462
+ table442,3,NULL
1463
+ table442,4,NULL
1464
+ table442,5,NULL
1465
+ table442,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1466
+ table442,7,http://w3id.org/sepses/resource/capec#typicalSeverity
1467
+ table442,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1468
+ table442,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
1469
+ table442,10,NULL
1470
+ table442,11,http://w3id.org/sepses/resource/capec#SkillRequired
1471
+ table442,12,NULL
1472
+ table442,13,NULL
1473
+ table442,14,http://w3id.org/sepses/resource/capec#Consequences
1474
+ table442,15,http://w3id.org/sepses/resource/capec#Mitigations
1475
+ table442,16,NULL
1476
+ table442,17,http://w3id.org/sepses/resource/cwe#CWE
1477
+ table442,18,NULL
1478
+ table442,19,NULL
1479
+ table443,0,http://w3id.org/sepses/resource/capec#CAPEC
1480
+ table443,1,http://w3id.org/sepses/resource/capec#CAPEC
1481
+ table443,2,NULL
1482
+ table443,3,NULL
1483
+ table443,4,NULL
1484
+ table443,5,NULL
1485
+ table443,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1486
+ table443,7,http://w3id.org/sepses/resource/capec#typicalSeverity
1487
+ table443,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1488
+ table443,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
1489
+ table443,10,NULL
1490
+ table443,11,http://w3id.org/sepses/resource/capec#SkillRequired
1491
+ table443,12,NULL
1492
+ table443,13,NULL
1493
+ table443,14,http://w3id.org/sepses/resource/capec#Consequences
1494
+ table443,15,http://w3id.org/sepses/resource/capec#Mitigations
1495
+ table443,16,NULL
1496
+ table443,17,http://w3id.org/sepses/resource/cwe#CWE
1497
+ table443,18,NULL
1498
+ table443,19,NULL
1499
+ table444,0,http://w3id.org/sepses/resource/cve#CVE
1500
+ table444,1,http://w3id.org/sepses/resource/cpe#Product
1501
+ table444,2,http://w3id.org/sepses/resource/cve#Reference
1502
+ table444,3,NULL
1503
+ table444,4,NULL
1504
+ table444,5,http://w3id.org/sepses/resource/capec#CAPEC
1505
+ table445,0,http://w3id.org/sepses/resource/cve#CVE
1506
+ table445,1,http://w3id.org/sepses/resource/cpe#CPE
1507
+ table445,2,NULL
1508
+ table445,3,NULL
1509
+ table446,0,http://w3id.org/sepses/resource/cpe#CPE
1510
+ table446,1,NULL
1511
+ table446,2,NULL
1512
+ table446,3,http://w3id.org/sepses/resource/cpe#Vendor
1513
+ table446,4,http://w3id.org/sepses/resource/cpe#Product
1514
+ table446,5,http://w3id.org/sepses/resource/cpe#CPE
1515
+ table447,0,http://w3id.org/sepses/resource/cpe#CPE
1516
+ table447,1,http://w3id.org/sepses/resource/cpe#CPE
1517
+ table447,2,http://w3id.org/sepses/resource/cpe#productName
1518
+ table447,3,NULL
1519
+ table447,4,NULL
1520
+ table447,5,NULL
1521
+ table447,6,http://w3id.org/sepses/resource/cpe#Vendor
1522
+ table447,7,http://w3id.org/sepses/resource/cpe#Product
1523
+ table447,8,NULL
1524
+ table448,0,http://w3id.org/sepses/resource/capec#CAPEC
1525
+ table448,1,NULL
1526
+ table449,0,http://w3id.org/sepses/resource/cpe#CPE
1527
+ table449,1,NULL
1528
+ table45,0,http://w3id.org/sepses/resource/cve#CVE
1529
+ table45,1,NULL
1530
+ table45,2,NULL
1531
+ table450,0,http://w3id.org/sepses/resource/cwe#CWE
1532
+ table450,1,http://w3id.org/sepses/resource/cwe#Reference
1533
+ table450,2,NULL
1534
+ table450,3,http://w3id.org/sepses/resource/cwe#CommonConsequence
1535
+ table450,4,NULL
1536
+ table450,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1537
+ table450,6,NULL
1538
+ table450,7,http://w3id.org/sepses/resource/capec#CAPEC
1539
+ table450,8,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1540
+ table450,9,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1541
+ table450,10,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1542
+ table450,11,NULL
1543
+ table450,12,NULL
1544
+ table451,0,http://w3id.org/sepses/resource/cve#CVE
1545
+ table451,1,http://w3id.org/sepses/resource/cpe#Vendor
1546
+ table451,2,http://w3id.org/sepses/resource/cpe#CPE
1547
+ table451,3,http://w3id.org/sepses/resource/cvss#baseSeverity
1548
+ table451,4,NULL
1549
+ table452,0,http://w3id.org/sepses/resource/cwe#CWE
1550
+ table452,1,NULL
1551
+ table452,2,http://w3id.org/sepses/resource/cwe#CWE
1552
+ table452,3,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1553
+ table452,4,NULL
1554
+ table452,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1555
+ table452,6,NULL
1556
+ table452,7,http://w3id.org/sepses/resource/cwe#CommonConsequence
1557
+ table452,8,NULL
1558
+ table452,9,http://w3id.org/sepses/resource/cwe#Reference
1559
+ table452,10,NULL
1560
+ table453,0,http://w3id.org/sepses/resource/cwe#CWE
1561
+ table453,1,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1562
+ table453,2,NULL
1563
+ table453,3,NULL
1564
+ table453,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
1565
+ table453,5,NULL
1566
+ table454,0,http://w3id.org/sepses/resource/capec#CAPEC
1567
+ table454,1,NULL
1568
+ table454,2,NULL
1569
+ table454,3,NULL
1570
+ table455,0,http://w3id.org/sepses/resource/capec#CAPEC
1571
+ table455,1,NULL
1572
+ table455,2,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1573
+ table456,0,http://w3id.org/sepses/resource/capec#CAPEC
1574
+ table456,1,http://w3id.org/sepses/resource/capec#CAPEC
1575
+ table456,2,NULL
1576
+ table456,3,NULL
1577
+ table456,4,NULL
1578
+ table456,5,NULL
1579
+ table456,6,http://w3id.org/sepses/resource/cwe#CWE
1580
+ table456,7,NULL
1581
+ table458,0,http://w3id.org/sepses/resource/cve#CVE
1582
+ table458,1,http://w3id.org/sepses/resource/cpe#Vendor
1583
+ table458,2,NULL
1584
+ table458,3,NULL
1585
+ table458,4,NULL
1586
+ table459,0,http://w3id.org/sepses/resource/cpe#CPE
1587
+ table459,1,NULL
1588
+ table460,0,http://w3id.org/sepses/resource/cwe#CWE
1589
+ table460,1,http://w3id.org/sepses/resource/capec#CAPEC
1590
+ table460,2,NULL
1591
+ table460,3,NULL
1592
+ table460,4,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1593
+ table460,5,http://w3id.org/sepses/resource/cwe#CommonConsequence
1594
+ table460,6,http://w3id.org/sepses/resource/cwe#Reference
1595
+ table460,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1596
+ table462,0,http://w3id.org/sepses/resource/cpe#CPE
1597
+ table462,1,http://w3id.org/sepses/resource/cpe#Product
1598
+ table462,2,http://w3id.org/sepses/resource/cpe#productName
1599
+ table462,3,NULL
1600
+ table462,4,NULL
1601
+ table463,0,http://w3id.org/sepses/resource/cve#CVE
1602
+ table463,1,NULL
1603
+ table463,2,http://w3id.org/sepses/resource/cpe#vendorName
1604
+ table463,3,http://w3id.org/sepses/resource/cwe#CWE
1605
+ table463,4,http://w3id.org/sepses/resource/cpe#Vendor
1606
+ table463,5,http://w3id.org/sepses/resource/cpe#Product
1607
+ table463,6,NULL
1608
+ table463,7,http://w3id.org/sepses/resource/capec#CAPEC
1609
+ table463,8,NULL
1610
+ table463,9,http://w3id.org/sepses/resource/cpe#CPE
1611
+ table463,10,http://w3id.org/sepses/resource/cvss#baseSeverity
1612
+ table463,11,http://w3id.org/sepses/resource/cve#Reference
1613
+ table464,0,http://w3id.org/sepses/resource/cwe#CWE
1614
+ table464,1,NULL
1615
+ table464,2,NULL
1616
+ table464,3,NULL
1617
+ table464,4,NULL
1618
+ table465,0,http://w3id.org/sepses/resource/cwe#CWE
1619
+ table465,1,NULL
1620
+ table465,2,NULL
1621
+ table465,3,NULL
1622
+ table465,4,NULL
1623
+ table465,5,NULL
1624
+ table465,6,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1625
+ table465,7,NULL
1626
+ table465,8,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1627
+ table465,9,NULL
1628
+ table465,10,NULL
1629
+ table466,0,http://w3id.org/sepses/resource/cwe#CWE
1630
+ table466,1,NULL
1631
+ table467,0,http://w3id.org/sepses/resource/capec#CAPEC
1632
+ table467,1,NULL
1633
+ table468,0,http://w3id.org/sepses/resource/cwe#CWE
1634
+ table468,1,NULL
1635
+ table469,0,http://w3id.org/sepses/resource/cpe#CPE
1636
+ table469,1,NULL
1637
+ table470,0,http://w3id.org/sepses/resource/cve#CVE
1638
+ table470,1,http://w3id.org/sepses/resource/cpe#Vendor
1639
+ table470,2,http://w3id.org/sepses/resource/cve#Reference
1640
+ table470,3,http://w3id.org/sepses/resource/cwe#CWE
1641
+ table470,4,http://w3id.org/sepses/resource/cpe#Product
1642
+ table470,5,NULL
1643
+ table470,6,http://w3id.org/sepses/resource/capec#CAPEC
1644
+ table471,0,http://w3id.org/sepses/resource/cve#CVE
1645
+ table471,1,http://w3id.org/sepses/resource/cpe#Vendor
1646
+ table471,2,NULL
1647
+ table471,3,NULL
1648
+ table471,4,NULL
1649
+ table472,0,http://w3id.org/sepses/resource/cwe#CWE
1650
+ table472,1,NULL
1651
+ table472,2,NULL
1652
+ table472,3,NULL
1653
+ table472,4,NULL
1654
+ table473,0,http://w3id.org/sepses/resource/cpe#CPE
1655
+ table473,1,http://w3id.org/sepses/resource/cpe#CPE
1656
+ table473,2,http://w3id.org/sepses/resource/cpe#Product
1657
+ table473,3,NULL
1658
+ table473,4,NULL
1659
+ table473,5,http://w3id.org/sepses/resource/cpe#Vendor
1660
+ table474,0,http://w3id.org/sepses/resource/capec#CAPEC
1661
+ table474,1,http://w3id.org/sepses/resource/capec#Mitigations
1662
+ table474,2,NULL
1663
+ table474,3,NULL
1664
+ table474,4,http://w3id.org/sepses/resource/cwe#CWE
1665
+ table476,0,http://w3id.org/sepses/resource/cwe#CWE
1666
+ table476,1,NULL
1667
+ table476,2,NULL
1668
+ table476,3,NULL
1669
+ table476,4,http://w3id.org/sepses/resource/cwe#CommonConsequence
1670
+ table476,5,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1671
+ table476,6,http://w3id.org/sepses/resource/cwe#DetectionMethod
1672
+ table476,7,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1673
+ table476,8,NULL
1674
+ table477,0,http://w3id.org/sepses/resource/cpe#CPE
1675
+ table477,1,http://w3id.org/sepses/resource/cpe#CPE
1676
+ table477,2,http://w3id.org/sepses/resource/cpe#productName
1677
+ table477,3,NULL
1678
+ table477,4,NULL
1679
+ table477,5,NULL
1680
+ table477,6,http://w3id.org/sepses/resource/cpe#Vendor
1681
+ table477,7,http://w3id.org/sepses/resource/cpe#Product
1682
+ table477,8,NULL
1683
+ table478,0,http://w3id.org/sepses/resource/capec#CAPEC
1684
+ table478,1,http://w3id.org/sepses/resource/capec#typicalSeverity
1685
+ table478,2,NULL
1686
+ table478,3,NULL
1687
+ table478,4,NULL
1688
+ table478,5,NULL
1689
+ table478,6,NULL
1690
+ table478,0,http://w3id.org/sepses/resource/cwe#CWE
1691
+ table478,1,NULL
1692
+ table478,2,NULL
1693
+ table478,3,NULL
1694
+ table479,0,http://w3id.org/sepses/resource/cpe#CPE
1695
+ table479,1,http://w3id.org/sepses/resource/cpe#CPE
1696
+ table479,2,NULL
1697
+ table479,3,NULL
1698
+ table480,0,http://w3id.org/sepses/resource/cwe#CWE
1699
+ table480,1,NULL
1700
+ table480,2,NULL
1701
+ table480,3,NULL
1702
+ table480,4,http://w3id.org/sepses/resource/cwe#CWE
1703
+ table480,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1704
+ table480,6,NULL
1705
+ table480,7,NULL
1706
+ table480,8,http://w3id.org/sepses/resource/cwe#Reference
1707
+ table481,0,http://w3id.org/sepses/resource/capec#CAPEC
1708
+ table481,1,http://w3id.org/sepses/resource/capec#ExecutionFlow
1709
+ table481,2,NULL
1710
+ table481,3,NULL
1711
+ table481,4,NULL
1712
+ table481,5,http://w3id.org/sepses/resource/capec#typicalSeverity
1713
+ table481,6,http://w3id.org/sepses/resource/capec#CAPEC
1714
+ table481,7,http://w3id.org/sepses/resource/capec#SkillRequired
1715
+ table481,8,NULL
1716
+ table481,9,NULL
1717
+ table482,0,http://w3id.org/sepses/resource/cpe#CPE
1718
+ table482,1,http://w3id.org/sepses/resource/cpe#CPE
1719
+ table482,2,http://w3id.org/sepses/resource/cpe#productName
1720
+ table482,3,NULL
1721
+ table482,4,NULL
1722
+ table482,5,NULL
1723
+ table482,6,http://w3id.org/sepses/resource/cpe#Vendor
1724
+ table482,7,http://w3id.org/sepses/resource/cpe#Product
1725
+ table482,8,NULL
1726
+ table483,0,http://w3id.org/sepses/resource/capec#CAPEC
1727
+ table483,1,http://w3id.org/sepses/resource/capec#CAPEC
1728
+ table483,2,NULL
1729
+ table483,3,NULL
1730
+ table483,4,NULL
1731
+ table483,5,NULL
1732
+ table483,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1733
+ table483,7,http://w3id.org/sepses/resource/capec#typicalSeverity
1734
+ table483,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1735
+ table483,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
1736
+ table483,10,NULL
1737
+ table483,11,http://w3id.org/sepses/resource/capec#SkillRequired
1738
+ table483,12,NULL
1739
+ table483,13,NULL
1740
+ table483,14,http://w3id.org/sepses/resource/capec#Consequences
1741
+ table483,15,http://w3id.org/sepses/resource/capec#Mitigations
1742
+ table483,16,NULL
1743
+ table483,17,http://w3id.org/sepses/resource/cwe#CWE
1744
+ table483,18,NULL
1745
+ table483,19,NULL
1746
+ table484,0,http://w3id.org/sepses/resource/cve#CVE
1747
+ table484,1,NULL
1748
+ table484,2,http://w3id.org/sepses/resource/cpe#vendorName
1749
+ table484,3,http://w3id.org/sepses/resource/cwe#CWE
1750
+ table484,4,http://w3id.org/sepses/resource/cpe#Vendor
1751
+ table484,5,http://w3id.org/sepses/resource/cpe#Product
1752
+ table484,6,NULL
1753
+ table484,7,http://w3id.org/sepses/resource/capec#CAPEC
1754
+ table484,8,NULL
1755
+ table484,9,http://w3id.org/sepses/resource/cpe#CPE
1756
+ table484,10,http://w3id.org/sepses/resource/cvss#baseSeverity
1757
+ table484,11,http://w3id.org/sepses/resource/cve#Reference
1758
+ table485,0,http://w3id.org/sepses/resource/cpe#CPE
1759
+ table485,1,NULL
1760
+ table486,0,http://w3id.org/sepses/resource/cwe#CWE
1761
+ table486,1,NULL
1762
+ table487,0,http://w3id.org/sepses/resource/cve#CVE
1763
+ table487,1,NULL
1764
+ table487,2,http://w3id.org/sepses/resource/cpe#Product
1765
+ table487,3,http://w3id.org/sepses/resource/cve#Reference
1766
+ table487,4,NULL
1767
+ table488,0,http://w3id.org/sepses/resource/cve#CVE
1768
+ table488,1,NULL
1769
+ table488,2,NULL
1770
+ table488,3,NULL
1771
+ table489,0,http://w3id.org/sepses/resource/capec#CAPEC
1772
+ table489,1,http://w3id.org/sepses/resource/capec#typicalSeverity
1773
+ table489,2,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1774
+ table489,3,http://w3id.org/sepses/resource/capec#Consequences
1775
+ table489,4,http://w3id.org/sepses/resource/capec#ExecutionFlow
1776
+ table489,5,http://w3id.org/sepses/resource/capec#Mitigations
1777
+ table49,0,http://w3id.org/sepses/resource/cpe#CPE
1778
+ table49,1,http://w3id.org/sepses/resource/cpe#CPE
1779
+ table49,2,http://w3id.org/sepses/resource/cpe#productName
1780
+ table49,3,NULL
1781
+ table49,4,NULL
1782
+ table49,5,NULL
1783
+ table49,6,http://w3id.org/sepses/resource/cpe#Vendor
1784
+ table49,7,http://w3id.org/sepses/resource/cpe#Product
1785
+ table49,8,NULL
1786
+ table490,0,http://w3id.org/sepses/resource/capec#CAPEC
1787
+ table490,1,http://w3id.org/sepses/resource/capec#CAPEC
1788
+ table490,2,NULL
1789
+ table490,3,NULL
1790
+ table490,4,NULL
1791
+ table490,5,NULL
1792
+ table490,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1793
+ table490,7,http://w3id.org/sepses/resource/capec#typicalSeverity
1794
+ table490,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1795
+ table490,9,http://w3id.org/sepses/resource/capec#ExecutionFlow
1796
+ table490,10,NULL
1797
+ table490,11,http://w3id.org/sepses/resource/capec#SkillRequired
1798
+ table490,12,NULL
1799
+ table490,13,NULL
1800
+ table490,14,http://w3id.org/sepses/resource/capec#Consequences
1801
+ table490,15,http://w3id.org/sepses/resource/capec#Mitigations
1802
+ table490,16,NULL
1803
+ table490,17,http://w3id.org/sepses/resource/cwe#CWE
1804
+ table490,18,NULL
1805
+ table490,19,NULL
1806
+ table491,0,http://w3id.org/sepses/resource/capec#CAPEC
1807
+ table491,1,NULL
1808
+ table491,2,NULL
1809
+ table491,3,http://w3id.org/sepses/resource/capec#Mitigations
1810
+ table491,4,NULL
1811
+ table491,5,http://w3id.org/sepses/resource/cwe#CWE
1812
+ table491,6,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1813
+ table491,7,NULL
1814
+ table492,0,http://w3id.org/sepses/resource/cpe#CPE
1815
+ table492,1,http://w3id.org/sepses/resource/cpe#Product
1816
+ table492,2,NULL
1817
+ table492,3,http://w3id.org/sepses/resource/cpe#productName
1818
+ table493,0,http://w3id.org/sepses/resource/cve#CVE
1819
+ table493,1,http://w3id.org/sepses/resource/cwe#CWE
1820
+ table494,0,http://w3id.org/sepses/resource/capec#CAPEC
1821
+ table494,1,http://w3id.org/sepses/resource/capec#Consequences
1822
+ table494,2,NULL
1823
+ table494,3,http://w3id.org/sepses/resource/capec#likehoodOfAttack
1824
+ table495,0,http://w3id.org/sepses/resource/cwe#CWE
1825
+ table495,1,NULL
1826
+ table495,2,NULL
1827
+ table496,0,http://w3id.org/sepses/resource/cpe#CPE
1828
+ table496,1,http://w3id.org/sepses/resource/cpe#CPE
1829
+ table497,0,http://w3id.org/sepses/resource/capec#CAPEC
1830
+ table497,1,NULL
1831
+ table497,2,http://w3id.org/sepses/resource/capec#SkillRequired
1832
+ table497,3,http://w3id.org/sepses/resource/capec#ExecutionFlow
1833
+ table497,4,http://w3id.org/sepses/resource/capec#Consequences
1834
+ table497,5,http://w3id.org/sepses/resource/capec#Mitigations
1835
+ table498,0,http://w3id.org/sepses/resource/cve#CVE
1836
+ table498,1,NULL
1837
+ table498,2,http://w3id.org/sepses/resource/cvss#baseSeverity
1838
+ table498,3,http://w3id.org/sepses/resource/cpe#Product
1839
+ table499,0,http://w3id.org/sepses/resource/cve#CVE
1840
+ table499,1,http://w3id.org/sepses/resource/cpe#Vendor
1841
+ table499,2,NULL
1842
+ table5,0,http://w3id.org/sepses/resource/cwe#CWE
1843
+ table5,1,NULL
1844
+ table5,2,NULL
1845
+ table5,3,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1846
+ table5,4,NULL
1847
+ table500,0,http://w3id.org/sepses/resource/capec#CAPEC
1848
+ table500,1,http://w3id.org/sepses/resource/capec#typicalSeverity
1849
+ table500,2,http://w3id.org/sepses/resource/capec#SkillRequired
1850
+ table500,3,http://w3id.org/sepses/resource/capec#ExecutionFlow
1851
+ table500,4,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
1852
+ table500,5,NULL
1853
+ table500,6,http://w3id.org/sepses/resource/cwe#CWE
1854
+ table500,7,NULL
1855
+ table500,8,NULL
1856
+ table500,9,NULL
1857
+ table52,0,http://w3id.org/sepses/resource/cve#CVE
1858
+ table52,1,http://w3id.org/sepses/resource/cvss#baseSeverity
1859
+ table59,0,http://w3id.org/sepses/resource/cwe#CWE
1860
+ table59,1,http://w3id.org/sepses/resource/cwe#CWE
1861
+ table59,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1862
+ table59,3,http://w3id.org/sepses/resource/capec#CAPEC
1863
+ table59,4,NULL
1864
+ table59,5,NULL
1865
+ table59,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1866
+ table59,7,http://w3id.org/sepses/resource/cwe#CommonConsequence
1867
+ table61,0,http://w3id.org/sepses/resource/cwe#CWE
1868
+ table61,1,NULL
1869
+ table61,2,NULL
1870
+ table61,3,NULL
1871
+ table61,4,http://w3id.org/sepses/resource/cwe#Reference
1872
+ table61,5,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1873
+ table61,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1874
+ table61,7,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1875
+ table61,8,NULL
1876
+ table61,9,http://w3id.org/sepses/resource/cwe#DetectionMethod
1877
+ table61,10,NULL
1878
+ table61,11,NULL
1879
+ table61,12,NULL
1880
+ table62,0,http://w3id.org/sepses/resource/cwe#CWE
1881
+ table62,1,NULL
1882
+ table62,2,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1883
+ table62,3,http://w3id.org/sepses/resource/cwe#Reference
1884
+ table65,0,http://w3id.org/sepses/resource/cve#CVE
1885
+ table65,1,NULL
1886
+ table65,2,http://w3id.org/sepses/resource/cpe#vendorName
1887
+ table65,3,http://w3id.org/sepses/resource/cve#Reference
1888
+ table68,0,http://w3id.org/sepses/resource/cwe#CWE
1889
+ table68,1,NULL
1890
+ table70,0,http://w3id.org/sepses/resource/cwe#CWE
1891
+ table70,1,NULL
1892
+ table70,2,NULL
1893
+ table70,3,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1894
+ table70,4,NULL
1895
+ table70,5,NULL
1896
+ table70,6,NULL
1897
+ table70,7,NULL
1898
+ table70,8,http://w3id.org/sepses/resource/cwe#CWE
1899
+ table72,0,http://w3id.org/sepses/resource/cpe#CPE
1900
+ table72,1,http://w3id.org/sepses/resource/cpe#CPE
1901
+ table72,2,http://w3id.org/sepses/resource/cpe#productName
1902
+ table72,3,NULL
1903
+ table72,4,NULL
1904
+ table72,5,NULL
1905
+ table72,6,http://w3id.org/sepses/resource/cpe#Vendor
1906
+ table72,7,http://w3id.org/sepses/resource/cpe#Product
1907
+ table72,8,NULL
1908
+ table73,0,http://w3id.org/sepses/resource/cwe#CWE
1909
+ table73,1,NULL
1910
+ table73,2,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1911
+ table73,3,NULL
1912
+ table73,4,http://w3id.org/sepses/resource/cwe#Reference
1913
+ table73,5,NULL
1914
+ table73,6,NULL
1915
+ table73,7,http://w3id.org/sepses/resource/capec#CAPEC
1916
+ table73,8,NULL
1917
+ table73,9,NULL
1918
+ table73,10,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1919
+ table73,11,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1920
+ table73,12,http://w3id.org/sepses/resource/cwe#CommonConsequence
1921
+ table77,0,http://w3id.org/sepses/resource/capec#CAPEC
1922
+ table77,1,http://w3id.org/sepses/resource/capec#SkillRequired
1923
+ table77,2,http://w3id.org/sepses/resource/capec#typicalSeverity
1924
+ table77,3,NULL
1925
+ table77,4,NULL
1926
+ table77,5,http://w3id.org/sepses/resource/cwe#CWE
1927
+ table77,6,http://w3id.org/sepses/resource/capec#ExecutionFlow
1928
+ table78,0,http://w3id.org/sepses/resource/cpe#CPE
1929
+ table78,1,http://w3id.org/sepses/resource/cpe#CPE
1930
+ table78,2,http://w3id.org/sepses/resource/cpe#productName
1931
+ table78,3,NULL
1932
+ table78,4,NULL
1933
+ table78,5,NULL
1934
+ table78,6,http://w3id.org/sepses/resource/cpe#Vendor
1935
+ table78,7,http://w3id.org/sepses/resource/cpe#Product
1936
+ table78,8,NULL
1937
+ table80,0,http://w3id.org/sepses/resource/cwe#CWE
1938
+ table80,1,http://w3id.org/sepses/resource/cwe#CWE
1939
+ table80,2,NULL
1940
+ table80,3,NULL
1941
+ table80,4,NULL
1942
+ table80,5,NULL
1943
+ table80,6,http://w3id.org/sepses/resource/cwe#RelatedWeakness
1944
+ table80,7,NULL
1945
+ table80,8,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1946
+ table80,9,NULL
1947
+ table80,10,NULL
1948
+ table80,11,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1949
+ table80,12,NULL
1950
+ table80,13,NULL
1951
+ table80,14,http://w3id.org/sepses/resource/cwe#CommonConsequence
1952
+ table80,15,http://w3id.org/sepses/resource/cwe#DetectionMethod
1953
+ table80,16,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1954
+ table80,17,http://w3id.org/sepses/resource/cwe#Reference
1955
+ table80,18,NULL
1956
+ table80,19,NULL
1957
+ table80,20,NULL
1958
+ table80,21,http://w3id.org/sepses/resource/capec#CAPEC
1959
+ table80,22,NULL
1960
+ table82,0,http://w3id.org/sepses/resource/cve#CVE
1961
+ table82,1,NULL
1962
+ table82,2,http://w3id.org/sepses/resource/cpe#vendorName
1963
+ table82,3,http://w3id.org/sepses/resource/cve#Reference
1964
+ table82,4,http://w3id.org/sepses/resource/cpe#CPE
1965
+ table83,0,http://w3id.org/sepses/resource/cve#CVE
1966
+ table83,1,NULL
1967
+ table83,2,http://w3id.org/sepses/resource/cve#Reference
1968
+ table83,3,NULL
1969
+ table83,4,http://w3id.org/sepses/resource/cpe#vendorName
1970
+ table83,5,http://w3id.org/sepses/resource/cpe#Vendor
1971
+ table83,6,http://w3id.org/sepses/resource/cpe#CPE
1972
+ table88,0,http://w3id.org/sepses/resource/cve#CVE
1973
+ table88,1,NULL
1974
+ table91,0,http://w3id.org/sepses/resource/cve#CVE
1975
+ table91,1,http://w3id.org/sepses/resource/cpe#Vendor
1976
+ table91,2,http://w3id.org/sepses/resource/cpe#Product
1977
+ table96,0,http://w3id.org/sepses/resource/cwe#CWE
1978
+ table96,1,NULL
1979
+ table96,2,NULL
1980
+ table96,3,NULL
1981
+ table96,4,NULL
1982
+ table96,5,http://w3id.org/sepses/resource/cwe#ModeOfIntroduction
1983
+ table96,6,http://w3id.org/sepses/resource/cwe#CWE
1984
+ table96,7,http://w3id.org/sepses/resource/cwe#PotentialMitigation
1985
+ table96,8,NULL
1986
+ table96,9,NULL
1987
+ table96,10,http://w3id.org/sepses/resource/cwe#ApplicablePlatform
1988
+ table96,11,NULL
1989
+ table97,0,http://w3id.org/sepses/resource/cve#CVE
1990
+ table97,1,NULL
1991
+ table97,2,NULL
1992
+ table97,3,http://w3id.org/sepses/resource/cve#Reference
1993
+ table97,4,NULL
1994
+ table97,5,NULL
1995
+ table97,6,NULL
1996
+ table98,0,http://w3id.org/sepses/resource/capec#CAPEC
1997
+ table98,1,http://w3id.org/sepses/resource/cwe#CWE
1998
+ table98,2,NULL
1999
+ table98,3,NULL
2000
+ table98,4,http://w3id.org/sepses/resource/capec#likehoodOfAttack
2001
+ table98,5,http://w3id.org/sepses/resource/capec#SkillRequired
2002
+ table98,6,NULL
2003
+ table98,7,NULL
2004
+ table98,8,http://w3id.org/sepses/resource/capec#RelatedAttackPattern
Train/tables/table1.csv ADDED
The diff for this file is too large to render. See raw diff