Add authority bootstrap flows and Concelier ops runbooks
This commit is contained in:
		
							
								
								
									
										72
									
								
								seed-data/cve/2025-10-15/CVE-2024-0001.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										72
									
								
								seed-data/cve/2025-10-15/CVE-2024-0001.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,72 @@ | ||||
| { | ||||
|   "dataType": "CVE_RECORD", | ||||
|   "dataVersion": "5.0", | ||||
|   "cveMetadata": { | ||||
|     "cveId": "CVE-2024-0001", | ||||
|     "assignerShortName": "ExampleOrg", | ||||
|     "state": "PUBLISHED", | ||||
|     "dateReserved": "2024-01-01T00:00:00Z", | ||||
|     "datePublished": "2024-09-10T12:00:00Z", | ||||
|     "dateUpdated": "2024-09-15T12:00:00Z" | ||||
|   }, | ||||
|   "containers": { | ||||
|     "cna": { | ||||
|       "title": "Example Product Remote Code Execution", | ||||
|       "descriptions": [ | ||||
|         { | ||||
|           "lang": "en", | ||||
|           "value": "An example vulnerability allowing remote attackers to execute arbitrary code." | ||||
|         } | ||||
|       ], | ||||
|       "affected": [ | ||||
|         { | ||||
|           "vendor": "ExampleVendor", | ||||
|           "product": "ExampleProduct", | ||||
|           "platform": "linux", | ||||
|           "defaultStatus": "affected", | ||||
|           "versions": [ | ||||
|             { | ||||
|               "status": "affected", | ||||
|               "version": "1.0.0", | ||||
|               "lessThan": "1.2.0", | ||||
|               "versionType": "semver" | ||||
|             }, | ||||
|             { | ||||
|               "status": "unaffected", | ||||
|               "version": "1.2.0", | ||||
|               "versionType": "semver" | ||||
|             } | ||||
|           ] | ||||
|         } | ||||
|       ], | ||||
|       "references": [ | ||||
|         { | ||||
|           "url": "https://example.com/security/advisory", | ||||
|           "name": "Vendor Advisory", | ||||
|           "tags": [ | ||||
|             "vendor-advisory" | ||||
|           ] | ||||
|         }, | ||||
|         { | ||||
|           "url": "https://cve.example.com/CVE-2024-0001", | ||||
|           "tags": [ | ||||
|             "third-party-advisory" | ||||
|           ] | ||||
|         } | ||||
|       ], | ||||
|       "metrics": [ | ||||
|         { | ||||
|           "cvssV3_1": { | ||||
|             "version": "3.1", | ||||
|             "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||||
|             "baseScore": 9.8, | ||||
|             "baseSeverity": "CRITICAL" | ||||
|           } | ||||
|         } | ||||
|       ], | ||||
|       "aliases": [ | ||||
|         "GHSA-xxxx-yyyy-zzzz" | ||||
|       ] | ||||
|     } | ||||
|   } | ||||
| } | ||||
							
								
								
									
										147
									
								
								seed-data/cve/2025-10-15/CVE-2024-4567.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										147
									
								
								seed-data/cve/2025-10-15/CVE-2024-4567.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,147 @@ | ||||
| { | ||||
|   "dataType": "CVE_RECORD", | ||||
|   "dataVersion": "5.1", | ||||
|   "cveMetadata": { | ||||
|     "cveId": "CVE-2024-4567", | ||||
|     "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", | ||||
|     "state": "PUBLISHED", | ||||
|     "assignerShortName": "Wordfence", | ||||
|     "dateReserved": "2024-05-06T19:34:14.071Z", | ||||
|     "datePublished": "2024-05-09T20:03:38.213Z", | ||||
|     "dateUpdated": "2024-08-01T20:47:40.724Z" | ||||
|   }, | ||||
|   "containers": { | ||||
|     "cna": { | ||||
|       "providerMetadata": { | ||||
|         "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", | ||||
|         "shortName": "Wordfence", | ||||
|         "dateUpdated": "2024-05-09T20:03:38.213Z" | ||||
|       }, | ||||
|       "affected": [ | ||||
|         { | ||||
|           "vendor": "themifyme", | ||||
|           "product": "Themify Shortcodes", | ||||
|           "versions": [ | ||||
|             { | ||||
|               "version": "*", | ||||
|               "status": "affected", | ||||
|               "lessThanOrEqual": "2.0.9", | ||||
|               "versionType": "semver" | ||||
|             } | ||||
|           ], | ||||
|           "defaultStatus": "unaffected" | ||||
|         } | ||||
|       ], | ||||
|       "descriptions": [ | ||||
|         { | ||||
|           "lang": "en", | ||||
|           "value": "The Themify Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themify_button shortcode in all versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." | ||||
|         } | ||||
|       ], | ||||
|       "title": "Themify Shortcodes <= 2.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via themify_button Shortcode", | ||||
|       "references": [ | ||||
|         { | ||||
|           "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ff9d7-6a14-4186-8550-4e5c50855e7f?source=cve" | ||||
|         }, | ||||
|         { | ||||
|           "url": "https://plugins.trac.wordpress.org/changeset/3082885/themify-shortcodes" | ||||
|         } | ||||
|       ], | ||||
|       "problemTypes": [ | ||||
|         { | ||||
|           "descriptions": [ | ||||
|             { | ||||
|               "lang": "en", | ||||
|               "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" | ||||
|             } | ||||
|           ] | ||||
|         } | ||||
|       ], | ||||
|       "metrics": [ | ||||
|         { | ||||
|           "cvssV3_1": { | ||||
|             "version": "3.1", | ||||
|             "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", | ||||
|             "baseScore": 6.4, | ||||
|             "baseSeverity": "MEDIUM" | ||||
|           } | ||||
|         } | ||||
|       ], | ||||
|       "credits": [ | ||||
|         { | ||||
|           "lang": "en", | ||||
|           "type": "finder", | ||||
|           "value": "Francesco Carlucci" | ||||
|         } | ||||
|       ], | ||||
|       "timeline": [ | ||||
|         { | ||||
|           "time": "2024-05-06T00:00:00.000+00:00", | ||||
|           "lang": "en", | ||||
|           "value": "Vendor Notified" | ||||
|         }, | ||||
|         { | ||||
|           "time": "2024-05-08T00:00:00.000+00:00", | ||||
|           "lang": "en", | ||||
|           "value": "Disclosed" | ||||
|         } | ||||
|       ] | ||||
|     }, | ||||
|     "adp": [ | ||||
|       { | ||||
|         "title": "CISA ADP Vulnrichment", | ||||
|         "metrics": [ | ||||
|           { | ||||
|             "other": { | ||||
|               "type": "ssvc", | ||||
|               "content": { | ||||
|                 "id": "CVE-2024-4567", | ||||
|                 "role": "CISA Coordinator", | ||||
|                 "options": [ | ||||
|                   { | ||||
|                     "Exploitation": "none" | ||||
|                   }, | ||||
|                   { | ||||
|                     "Automatable": "no" | ||||
|                   }, | ||||
|                   { | ||||
|                     "Technical Impact": "partial" | ||||
|                   } | ||||
|                 ], | ||||
|                 "version": "2.0.3", | ||||
|                 "timestamp": "2024-05-11T16:56:12.695905Z" | ||||
|               } | ||||
|             } | ||||
|           } | ||||
|         ], | ||||
|         "providerMetadata": { | ||||
|           "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", | ||||
|           "shortName": "CISA-ADP", | ||||
|           "dateUpdated": "2024-06-04T17:54:44.162Z" | ||||
|         } | ||||
|       }, | ||||
|       { | ||||
|         "providerMetadata": { | ||||
|           "orgId": "af854a3a-2127-422b-91ae-364da2661108", | ||||
|           "shortName": "CVE", | ||||
|           "dateUpdated": "2024-08-01T20:47:40.724Z" | ||||
|         }, | ||||
|         "title": "CVE Program Container", | ||||
|         "references": [ | ||||
|           { | ||||
|             "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ff9d7-6a14-4186-8550-4e5c50855e7f?source=cve", | ||||
|             "tags": [ | ||||
|               "x_transferred" | ||||
|             ] | ||||
|           }, | ||||
|           { | ||||
|             "url": "https://plugins.trac.wordpress.org/changeset/3082885/themify-shortcodes", | ||||
|             "tags": [ | ||||
|               "x_transferred" | ||||
|             ] | ||||
|           } | ||||
|         ] | ||||
|       } | ||||
|     ] | ||||
|   } | ||||
| } | ||||
		Reference in New Issue
	
	Block a user