Daily scaraping of Known Exploited Vulnerabilities @ CISA
Mirroring https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
daily and stores it on GitHub, since CISA restricts access and applys rate limites. This simply helps to keep everything at one place, and my automation up and running.
The magic is done with the help of this GitHub Action
You can simply grep the file and search in it like this:
# Store file
curl https://raw.githubusercontent.com/BenjiTrapp/cisa-known-vuln-scraper/main/cisa-kev.json -o cisa-kev.json
# Search by product name
jq -r '.vulnerabilities[] | select(.product == "FTA")' cisa-kev.json
# Search by Product name
jq -r '.vulnerabilities[] | select(.vendorProject == "Progress")' cisa-kev.json
# Search by CVE
jq -r '.vulnerabilities[] | select(.cveID == "CVE-2023-34362")' cisa-kev.json
For integration within Gradle it would look like this:
dependencyCheck {
analyzers {
knownExploitedURL = "https://raw.githubusercontent.com/BenjiTrapp/cisa-known-vuln-scraper/main/cisa-kev.json"
}
}