up
This commit is contained in:
72
seed-data/cve/2025-10-15/CVE-2024-0001.json
Normal file
72
seed-data/cve/2025-10-15/CVE-2024-0001.json
Normal file
@@ -0,0 +1,72 @@
|
||||
{
|
||||
"dataType": "CVE_RECORD",
|
||||
"dataVersion": "5.0",
|
||||
"cveMetadata": {
|
||||
"cveId": "CVE-2024-0001",
|
||||
"assignerShortName": "ExampleOrg",
|
||||
"state": "PUBLISHED",
|
||||
"dateReserved": "2024-01-01T00:00:00Z",
|
||||
"datePublished": "2024-09-10T12:00:00Z",
|
||||
"dateUpdated": "2024-09-15T12:00:00Z"
|
||||
},
|
||||
"containers": {
|
||||
"cna": {
|
||||
"title": "Example Product Remote Code Execution",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An example vulnerability allowing remote attackers to execute arbitrary code."
|
||||
}
|
||||
],
|
||||
"affected": [
|
||||
{
|
||||
"vendor": "ExampleVendor",
|
||||
"product": "ExampleProduct",
|
||||
"platform": "linux",
|
||||
"defaultStatus": "affected",
|
||||
"versions": [
|
||||
{
|
||||
"status": "affected",
|
||||
"version": "1.0.0",
|
||||
"lessThan": "1.2.0",
|
||||
"versionType": "semver"
|
||||
},
|
||||
{
|
||||
"status": "unaffected",
|
||||
"version": "1.2.0",
|
||||
"versionType": "semver"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://example.com/security/advisory",
|
||||
"name": "Vendor Advisory",
|
||||
"tags": [
|
||||
"vendor-advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cve.example.com/CVE-2024-0001",
|
||||
"tags": [
|
||||
"third-party-advisory"
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": [
|
||||
{
|
||||
"cvssV3_1": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"aliases": [
|
||||
"GHSA-xxxx-yyyy-zzzz"
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
147
seed-data/cve/2025-10-15/CVE-2024-4567.json
Normal file
147
seed-data/cve/2025-10-15/CVE-2024-4567.json
Normal file
@@ -0,0 +1,147 @@
|
||||
{
|
||||
"dataType": "CVE_RECORD",
|
||||
"dataVersion": "5.1",
|
||||
"cveMetadata": {
|
||||
"cveId": "CVE-2024-4567",
|
||||
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
|
||||
"state": "PUBLISHED",
|
||||
"assignerShortName": "Wordfence",
|
||||
"dateReserved": "2024-05-06T19:34:14.071Z",
|
||||
"datePublished": "2024-05-09T20:03:38.213Z",
|
||||
"dateUpdated": "2024-08-01T20:47:40.724Z"
|
||||
},
|
||||
"containers": {
|
||||
"cna": {
|
||||
"providerMetadata": {
|
||||
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
|
||||
"shortName": "Wordfence",
|
||||
"dateUpdated": "2024-05-09T20:03:38.213Z"
|
||||
},
|
||||
"affected": [
|
||||
{
|
||||
"vendor": "themifyme",
|
||||
"product": "Themify Shortcodes",
|
||||
"versions": [
|
||||
{
|
||||
"version": "*",
|
||||
"status": "affected",
|
||||
"lessThanOrEqual": "2.0.9",
|
||||
"versionType": "semver"
|
||||
}
|
||||
],
|
||||
"defaultStatus": "unaffected"
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Themify Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themify_button shortcode in all versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"title": "Themify Shortcodes <= 2.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via themify_button Shortcode",
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ff9d7-6a14-4186-8550-4e5c50855e7f?source=cve"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3082885/themify-shortcodes"
|
||||
}
|
||||
],
|
||||
"problemTypes": [
|
||||
{
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": [
|
||||
{
|
||||
"cvssV3_1": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"credits": [
|
||||
{
|
||||
"lang": "en",
|
||||
"type": "finder",
|
||||
"value": "Francesco Carlucci"
|
||||
}
|
||||
],
|
||||
"timeline": [
|
||||
{
|
||||
"time": "2024-05-06T00:00:00.000+00:00",
|
||||
"lang": "en",
|
||||
"value": "Vendor Notified"
|
||||
},
|
||||
{
|
||||
"time": "2024-05-08T00:00:00.000+00:00",
|
||||
"lang": "en",
|
||||
"value": "Disclosed"
|
||||
}
|
||||
]
|
||||
},
|
||||
"adp": [
|
||||
{
|
||||
"title": "CISA ADP Vulnrichment",
|
||||
"metrics": [
|
||||
{
|
||||
"other": {
|
||||
"type": "ssvc",
|
||||
"content": {
|
||||
"id": "CVE-2024-4567",
|
||||
"role": "CISA Coordinator",
|
||||
"options": [
|
||||
{
|
||||
"Exploitation": "none"
|
||||
},
|
||||
{
|
||||
"Automatable": "no"
|
||||
},
|
||||
{
|
||||
"Technical Impact": "partial"
|
||||
}
|
||||
],
|
||||
"version": "2.0.3",
|
||||
"timestamp": "2024-05-11T16:56:12.695905Z"
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"providerMetadata": {
|
||||
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"shortName": "CISA-ADP",
|
||||
"dateUpdated": "2024-06-04T17:54:44.162Z"
|
||||
}
|
||||
},
|
||||
{
|
||||
"providerMetadata": {
|
||||
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"shortName": "CVE",
|
||||
"dateUpdated": "2024-08-01T20:47:40.724Z"
|
||||
},
|
||||
"title": "CVE Program Container",
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ff9d7-6a14-4186-8550-4e5c50855e7f?source=cve",
|
||||
"tags": [
|
||||
"x_transferred"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3082885/themify-shortcodes",
|
||||
"tags": [
|
||||
"x_transferred"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
19
seed-data/ics-cisa/README.md
Normal file
19
seed-data/ics-cisa/README.md
Normal file
@@ -0,0 +1,19 @@
|
||||
# CISA ICS Advisory Seed Data
|
||||
|
||||
This directory is reserved for **seed data** sourced from the community-maintained [ICS Advisory Project](https://github.com/icsadvprj/ICS-Advisory-Project). The project republishes CISA ICS advisories under the **Open Database License (ODbL) v1.0**. StellaOps uses these CSV snapshots to bootstrap offline environments before the official GovDelivery credentials arrive.
|
||||
|
||||
> ⚠️ **Licence notice** – By downloading and using the CSV files you agree to the ODbL requirements (attribution, share-alike, and notice preservation). See [`LICENSE-ODBL.md`](https://github.com/icsadvprj/ICS-Advisory-Project/blob/main/LICENSE.md) for the full text.
|
||||
|
||||
## Usage
|
||||
|
||||
1. Run `scripts/fetch-ics-cisa-seed.sh` (or the PowerShell variant) to download the latest snapshots into this directory.
|
||||
2. The files are ignored by Git to avoid committing third-party data; include them explicitly when building an Offline Update Kit.
|
||||
3. When you later switch to live GovDelivery ingestion, keep the CSVs around as historical fixtures—do **not** treat them as an authoritative source once the live connector is enabled.
|
||||
|
||||
### Suggested Artefacts
|
||||
|
||||
- `CISA_ICS_ADV_Master.csv` – cumulative advisory dataset (2010 → present)
|
||||
- `CISA_ICS_ADV_<YYYY_MM_DD>.csv` – point-in-time snapshots
|
||||
- `ICSMA_CSV_<YYYY>.xlsx` – medical device advisories (optional, sourced from the community mirror)
|
||||
|
||||
Keep the generated SHA-256 files alongside the CSVs so Offline Kit packaging can verify integrity.
|
||||
Reference in New Issue
Block a user