Add authority bootstrap flows and Concelier ops runbooks
This commit is contained in:
@@ -0,0 +1,36 @@
|
||||
{
|
||||
"name": "WID-SEC-2025-2264",
|
||||
"title": "Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Codeausführung",
|
||||
"summary": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Ivanti Endpoint Manager ausnutzen.",
|
||||
"description": "<p>Ivanti Endpoint Manager weist mehrere Schwachstellen auf.</p><p>Ein Angreifer kann beliebigen Code ausführen.</p>",
|
||||
"severity": "hoch",
|
||||
"language": "de",
|
||||
"published": "2025-10-14T06:24:49Z",
|
||||
"updated": "2025-10-14T07:00:00Z",
|
||||
"cveIds": [
|
||||
"CVE-2025-1234",
|
||||
"CVE-2025-5678"
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://example.com/vendor/advisory",
|
||||
"label": "Vendor Advisory"
|
||||
},
|
||||
{
|
||||
"url": "https://example.com/mitre",
|
||||
"label": "MITRE"
|
||||
}
|
||||
],
|
||||
"products": [
|
||||
{
|
||||
"vendor": "Ivanti",
|
||||
"name": "Endpoint Manager",
|
||||
"versions": "2023.1 bis 2024.2"
|
||||
},
|
||||
{
|
||||
"vendor": "Ivanti",
|
||||
"name": "Endpoint Manager Cloud",
|
||||
"versions": "alle"
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,15 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<rss version="2.0">
|
||||
<channel>
|
||||
<title>BSI Warn- und Informationsdienst</title>
|
||||
<link>https://wid.cert-bund.de/portal/wid/securityadvisory</link>
|
||||
<description>Test feed</description>
|
||||
<pubDate>Tue, 14 Oct 2025 07:06:21 GMT</pubDate>
|
||||
<item>
|
||||
<title>[hoch] Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Codeausführung</title>
|
||||
<link>https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2264</link>
|
||||
<category>hoch</category>
|
||||
<pubDate>Tue, 14 Oct 2025 06:24:49 GMT</pubDate>
|
||||
</item>
|
||||
</channel>
|
||||
</rss>
|
||||
Reference in New Issue
Block a user