201 lines
5.5 KiB
JSON
201 lines
5.5 KiB
JSON
[
|
|
{
|
|
"advisoryKey": "acsc/multi/https-origin-example-advisories-info-bulletin",
|
|
"affectedPackages": [],
|
|
"aliases": [
|
|
"ACSC-2025-011",
|
|
"Bulletin",
|
|
"https://origin.example/advisories/info-bulletin"
|
|
],
|
|
"credits": [],
|
|
"cvssMetrics": [],
|
|
"exploitKnown": false,
|
|
"language": "en",
|
|
"modified": null,
|
|
"provenance": [
|
|
{
|
|
"source": "acsc",
|
|
"kind": "document",
|
|
"value": "https://origin.example/feeds/multi/rss",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"affectedpackages",
|
|
"aliases",
|
|
"references",
|
|
"summary"
|
|
]
|
|
},
|
|
{
|
|
"source": "acsc",
|
|
"kind": "feed",
|
|
"value": "multi",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"summary"
|
|
]
|
|
},
|
|
{
|
|
"source": "acsc",
|
|
"kind": "mapping",
|
|
"value": "https://origin.example/advisories/info-bulletin",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"affectedpackages",
|
|
"aliases",
|
|
"references",
|
|
"summary"
|
|
]
|
|
}
|
|
],
|
|
"published": "2025-10-12T02:30:00+00:00",
|
|
"references": [
|
|
{
|
|
"kind": "advisory",
|
|
"provenance": {
|
|
"source": "acsc",
|
|
"kind": "reference",
|
|
"value": "https://origin.example/advisories/info-bulletin",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": []
|
|
},
|
|
"sourceTag": "multi",
|
|
"summary": "Information bulletin",
|
|
"url": "https://origin.example/advisories/info-bulletin"
|
|
}
|
|
],
|
|
"severity": null,
|
|
"summary": "Serial number: ACSC-2025-011\n\nAdvisory type: Bulletin\n\nGeneral guidance bulletin.",
|
|
"title": "Information bulletin"
|
|
},
|
|
{
|
|
"advisoryKey": "acsc/multi/https-origin-example-advisories-router-critical",
|
|
"affectedPackages": [
|
|
{
|
|
"type": "vendor",
|
|
"identifier": "ExampleCo Router X",
|
|
"platform": null,
|
|
"versionRanges": [],
|
|
"normalizedVersions": [],
|
|
"statuses": [],
|
|
"provenance": [
|
|
{
|
|
"source": "acsc",
|
|
"kind": "affected",
|
|
"value": "ExampleCo Router X",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"affectedpackages"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vendor",
|
|
"identifier": "ExampleCo Router Y",
|
|
"platform": null,
|
|
"versionRanges": [],
|
|
"normalizedVersions": [],
|
|
"statuses": [],
|
|
"provenance": [
|
|
{
|
|
"source": "acsc",
|
|
"kind": "affected",
|
|
"value": "ExampleCo Router Y",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"affectedpackages"
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"aliases": [
|
|
"ACSC-2025-010",
|
|
"CVE-2025-0001",
|
|
"https://origin.example/advisories/router-critical"
|
|
],
|
|
"credits": [],
|
|
"cvssMetrics": [],
|
|
"exploitKnown": false,
|
|
"language": "en",
|
|
"modified": null,
|
|
"provenance": [
|
|
{
|
|
"source": "acsc",
|
|
"kind": "document",
|
|
"value": "https://origin.example/feeds/multi/rss",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"affectedpackages",
|
|
"aliases",
|
|
"references",
|
|
"summary"
|
|
]
|
|
},
|
|
{
|
|
"source": "acsc",
|
|
"kind": "feed",
|
|
"value": "multi",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"summary"
|
|
]
|
|
},
|
|
{
|
|
"source": "acsc",
|
|
"kind": "mapping",
|
|
"value": "https://origin.example/advisories/router-critical",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": [
|
|
"affectedpackages",
|
|
"aliases",
|
|
"references",
|
|
"summary"
|
|
]
|
|
}
|
|
],
|
|
"published": "2025-10-12T04:45:00+00:00",
|
|
"references": [
|
|
{
|
|
"kind": "advisory",
|
|
"provenance": {
|
|
"source": "acsc",
|
|
"kind": "reference",
|
|
"value": "https://origin.example/advisories/router-critical",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": []
|
|
},
|
|
"sourceTag": "multi",
|
|
"summary": "Critical router vulnerability",
|
|
"url": "https://origin.example/advisories/router-critical"
|
|
},
|
|
{
|
|
"kind": "reference",
|
|
"provenance": {
|
|
"source": "acsc",
|
|
"kind": "reference",
|
|
"value": "https://vendor.example/router/patch",
|
|
"decisionReason": null,
|
|
"recordedAt": "2025-10-12T00:00:00+00:00",
|
|
"fieldMask": []
|
|
},
|
|
"sourceTag": null,
|
|
"summary": "vendor patch",
|
|
"url": "https://vendor.example/router/patch"
|
|
}
|
|
],
|
|
"severity": "critical",
|
|
"summary": "Serial number: ACSC-2025-010\n\nSeverity: Critical\n\nSystems affected: ExampleCo Router X, ExampleCo Router Y\n\nRemote code execution on ExampleCo routers. See vendor patch.\n\nCVE references: CVE-2025-0001",
|
|
"title": "Critical router vulnerability"
|
|
}
|
|
] |