This commit is contained in:
StellaOps Bot
2025-12-09 00:20:52 +02:00
parent 3d01bf9edc
commit bc0762e97d
261 changed files with 14033 additions and 4427 deletions

View File

@@ -0,0 +1,4 @@
{"advisory_id":"ICSA-25-123-01","affected_products":[{"product":"ControlSuite","vendor":"Example Corp","versions":["4.2.0","4.2.1"]}],"cvss":{"score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"cwe":["CWE-269"],"fetched_at":"2025-12-08T02:05:00Z","payload_sha256":"634552b3ed7ffc9abfd691b16a60a68c8d81631b6a99149b97db1b093442a9bb","published":"2025-10-13T12:00:00Z","references":["https://example.com/security/icsa-25-123-01.pdf","https://www.cisa.gov/news-events/ics-advisories/icsa-25-123-01"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"High","signature":{"reason":"unsigned_source","status":"missing"},"source":"icscisa","source_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-123-01","summary":"Example Corp ControlSuite RCE via exposed management service.","title":"Example ICS Advisory","updated":"2025-11-30T00:00:00Z"}
{"advisory_id":"ICSMA-25-045-01","affected_products":[{"product":"InfusionManager","vendor":"HealthTech","versions":["2.1.0","2.1.1"]}],"cvss":{"score":6.3,"vector":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","version":"3.1"},"cwe":["CWE-319"],"fetched_at":"2025-12-08T02:05:00Z","payload_sha256":"b99750b070899a2e6455b3b8b7ca1dafa608cef5eb2c1f8ab40a21c5e22b731f","published":"2025-10-14T09:30:00Z","references":["https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-045-01","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11111"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"Medium","signature":{"reason":"unsigned_source","status":"missing"},"source":"icscisa","source_url":"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-045-01","summary":"HealthTech infusion pump vulnerabilities including two CVEs.","title":"Example Medical Advisory","updated":"2025-12-01T00:00:00Z"}
{"advisory_id":"KISA-2025-5859","affected_products":[{"product":"ControlBoard","vendor":"ACME","versions":["1.0.1.0084","2.0.1.0034"]}],"cvss":{"score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"cwe":["CWE-787"],"fetched_at":"2025-12-08T02:07:10Z","payload_sha256":"e3e599275e19a9b20555bfd1e637b77b97995a8b4b0a8ad348f57e3f1485fe29","published":"2025-11-03T22:53:00Z","references":["https://knvd.krcert.or.kr/rss/securityInfo.do","https://knvd.krcert.or.kr/detailDos.do?IDX=5859"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"High","signature":{"reason":"unsigned_source","status":"missing"},"source":"kisa","source_url":"https://knvd.krcert.or.kr/detailDos.do?IDX=5859","summary":"Remote code execution in ControlBoard service (offline HTML snapshot).","title":"KISA sample advisory 5859","updated":"2025-12-02T00:00:00Z"}
{"advisory_id":"KISA-2025-5860","affected_products":[{"product":"Edge","vendor":"NetGateway","versions":["3.4.2","3.4.3"]}],"cvss":{"score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"cwe":["CWE-798"],"fetched_at":"2025-12-08T02:07:45Z","payload_sha256":"1fc74f47e392e8b952d0206583fefcea6db86447094106b462b9ff4c4f06fef1","published":"2025-11-03T22:53:00Z","references":["https://knvd.krcert.or.kr/rss/securityInfo.do","https://knvd.krcert.or.kr/detailDos.do?IDX=5860"],"run_id":"icscisa-kisa-20251208T0205Z","severity":"Medium","signature":{"reason":"unsigned_source","status":"missing"},"source":"kisa","source_url":"https://knvd.krcert.or.kr/detailDos.do?IDX=5860","summary":"Authentication bypass via default credentials in NetGateway appliance.","title":"KISA sample advisory 5860","updated":"2025-12-02T00:00:00Z"}

View File

@@ -0,0 +1 @@
{"run_id":"icscisa-kisa-20251208T0205Z","generated_at":"2025-12-08T02:09:30Z","added":{"icscisa":["ICSA-25-123-01","ICSMA-25-045-01"],"kisa":["KISA-2025-5859","KISA-2025-5860"]},"updated":{"icscisa":[],"kisa":[]},"removed":{"icscisa":[],"kisa":[]},"totals":{"icscisa":{"added":2,"updated":0,"removed":0,"remaining":2},"kisa":{"added":2,"updated":0,"removed":0,"remaining":2},"overall":4},"previous_snapshot_sha256":null}

View File

@@ -0,0 +1,3 @@
0844c46c42461b8eeaf643c01d4cb74ef20d4eec8c984ad5e20c49d65dc57deb advisories.ndjson
1273beb246754382d2e013fdc98b11b06965fb97fe9a63735b51cc949746418f delta.json
8fedaa9fb2b146a1ef500b0d2e4c1592ddbc770a8f15b7d03723f8034fc12a75 fetch.log