Rename Concelier Source modules to Connector
This commit is contained in:
@@ -0,0 +1,201 @@
|
||||
[
|
||||
{
|
||||
"advisoryKey": "acsc/multi/https-origin-example-advisories-info-bulletin",
|
||||
"affectedPackages": [],
|
||||
"aliases": [
|
||||
"ACSC-2025-011",
|
||||
"Bulletin",
|
||||
"https://origin.example/advisories/info-bulletin"
|
||||
],
|
||||
"credits": [],
|
||||
"cvssMetrics": [],
|
||||
"exploitKnown": false,
|
||||
"language": "en",
|
||||
"modified": null,
|
||||
"provenance": [
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "document",
|
||||
"value": "https://origin.example/feeds/multi/rss",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"affectedpackages",
|
||||
"aliases",
|
||||
"references",
|
||||
"summary"
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "feed",
|
||||
"value": "multi",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"summary"
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "mapping",
|
||||
"value": "https://origin.example/advisories/info-bulletin",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"affectedpackages",
|
||||
"aliases",
|
||||
"references",
|
||||
"summary"
|
||||
]
|
||||
}
|
||||
],
|
||||
"published": "2025-10-12T02:30:00+00:00",
|
||||
"references": [
|
||||
{
|
||||
"kind": "advisory",
|
||||
"provenance": {
|
||||
"source": "acsc",
|
||||
"kind": "reference",
|
||||
"value": "https://origin.example/advisories/info-bulletin",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": []
|
||||
},
|
||||
"sourceTag": "multi",
|
||||
"summary": "Information bulletin",
|
||||
"url": "https://origin.example/advisories/info-bulletin"
|
||||
}
|
||||
],
|
||||
"severity": null,
|
||||
"summary": "Serial number: ACSC-2025-011\n\nAdvisory type: Bulletin\n\nGeneral guidance bulletin.",
|
||||
"title": "Information bulletin"
|
||||
},
|
||||
{
|
||||
"advisoryKey": "acsc/multi/https-origin-example-advisories-router-critical",
|
||||
"affectedPackages": [
|
||||
{
|
||||
"type": "vendor",
|
||||
"identifier": "ExampleCo Router X",
|
||||
"platform": null,
|
||||
"versionRanges": [],
|
||||
"normalizedVersions": [],
|
||||
"statuses": [],
|
||||
"provenance": [
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "affected",
|
||||
"value": "ExampleCo Router X",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"affectedpackages"
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"type": "vendor",
|
||||
"identifier": "ExampleCo Router Y",
|
||||
"platform": null,
|
||||
"versionRanges": [],
|
||||
"normalizedVersions": [],
|
||||
"statuses": [],
|
||||
"provenance": [
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "affected",
|
||||
"value": "ExampleCo Router Y",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"affectedpackages"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"aliases": [
|
||||
"ACSC-2025-010",
|
||||
"CVE-2025-0001",
|
||||
"https://origin.example/advisories/router-critical"
|
||||
],
|
||||
"credits": [],
|
||||
"cvssMetrics": [],
|
||||
"exploitKnown": false,
|
||||
"language": "en",
|
||||
"modified": null,
|
||||
"provenance": [
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "document",
|
||||
"value": "https://origin.example/feeds/multi/rss",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"affectedpackages",
|
||||
"aliases",
|
||||
"references",
|
||||
"summary"
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "feed",
|
||||
"value": "multi",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"summary"
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "acsc",
|
||||
"kind": "mapping",
|
||||
"value": "https://origin.example/advisories/router-critical",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": [
|
||||
"affectedpackages",
|
||||
"aliases",
|
||||
"references",
|
||||
"summary"
|
||||
]
|
||||
}
|
||||
],
|
||||
"published": "2025-10-12T04:45:00+00:00",
|
||||
"references": [
|
||||
{
|
||||
"kind": "advisory",
|
||||
"provenance": {
|
||||
"source": "acsc",
|
||||
"kind": "reference",
|
||||
"value": "https://origin.example/advisories/router-critical",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": []
|
||||
},
|
||||
"sourceTag": "multi",
|
||||
"summary": "Critical router vulnerability",
|
||||
"url": "https://origin.example/advisories/router-critical"
|
||||
},
|
||||
{
|
||||
"kind": "reference",
|
||||
"provenance": {
|
||||
"source": "acsc",
|
||||
"kind": "reference",
|
||||
"value": "https://vendor.example/router/patch",
|
||||
"decisionReason": null,
|
||||
"recordedAt": "2025-10-12T00:00:00+00:00",
|
||||
"fieldMask": []
|
||||
},
|
||||
"sourceTag": null,
|
||||
"summary": "vendor patch",
|
||||
"url": "https://vendor.example/router/patch"
|
||||
}
|
||||
],
|
||||
"severity": "critical",
|
||||
"summary": "Serial number: ACSC-2025-010\n\nSeverity: Critical\n\nSystems affected: ExampleCo Router X, ExampleCo Router Y\n\nRemote code execution on ExampleCo routers. See vendor patch.\n\nCVE references: CVE-2025-0001",
|
||||
"title": "Critical router vulnerability"
|
||||
}
|
||||
]
|
||||
Reference in New Issue
Block a user