Add authority bootstrap flows and Concelier ops runbooks
This commit is contained in:
		
							
								
								
									
										72
									
								
								seed-data/cve/2025-10-15/CVE-2024-0001.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										72
									
								
								seed-data/cve/2025-10-15/CVE-2024-0001.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,72 @@ | ||||
| { | ||||
|   "dataType": "CVE_RECORD", | ||||
|   "dataVersion": "5.0", | ||||
|   "cveMetadata": { | ||||
|     "cveId": "CVE-2024-0001", | ||||
|     "assignerShortName": "ExampleOrg", | ||||
|     "state": "PUBLISHED", | ||||
|     "dateReserved": "2024-01-01T00:00:00Z", | ||||
|     "datePublished": "2024-09-10T12:00:00Z", | ||||
|     "dateUpdated": "2024-09-15T12:00:00Z" | ||||
|   }, | ||||
|   "containers": { | ||||
|     "cna": { | ||||
|       "title": "Example Product Remote Code Execution", | ||||
|       "descriptions": [ | ||||
|         { | ||||
|           "lang": "en", | ||||
|           "value": "An example vulnerability allowing remote attackers to execute arbitrary code." | ||||
|         } | ||||
|       ], | ||||
|       "affected": [ | ||||
|         { | ||||
|           "vendor": "ExampleVendor", | ||||
|           "product": "ExampleProduct", | ||||
|           "platform": "linux", | ||||
|           "defaultStatus": "affected", | ||||
|           "versions": [ | ||||
|             { | ||||
|               "status": "affected", | ||||
|               "version": "1.0.0", | ||||
|               "lessThan": "1.2.0", | ||||
|               "versionType": "semver" | ||||
|             }, | ||||
|             { | ||||
|               "status": "unaffected", | ||||
|               "version": "1.2.0", | ||||
|               "versionType": "semver" | ||||
|             } | ||||
|           ] | ||||
|         } | ||||
|       ], | ||||
|       "references": [ | ||||
|         { | ||||
|           "url": "https://example.com/security/advisory", | ||||
|           "name": "Vendor Advisory", | ||||
|           "tags": [ | ||||
|             "vendor-advisory" | ||||
|           ] | ||||
|         }, | ||||
|         { | ||||
|           "url": "https://cve.example.com/CVE-2024-0001", | ||||
|           "tags": [ | ||||
|             "third-party-advisory" | ||||
|           ] | ||||
|         } | ||||
|       ], | ||||
|       "metrics": [ | ||||
|         { | ||||
|           "cvssV3_1": { | ||||
|             "version": "3.1", | ||||
|             "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||||
|             "baseScore": 9.8, | ||||
|             "baseSeverity": "CRITICAL" | ||||
|           } | ||||
|         } | ||||
|       ], | ||||
|       "aliases": [ | ||||
|         "GHSA-xxxx-yyyy-zzzz" | ||||
|       ] | ||||
|     } | ||||
|   } | ||||
| } | ||||
		Reference in New Issue
	
	Block a user