Skip to content

Latest commit

 

History

History
39 lines (28 loc) · 1.45 KB

README.md

File metadata and controls

39 lines (28 loc) · 1.45 KB

Daily scraper of CISA KEV json


Daily scaraping of Known Exploited Vulnerabilities @ CISA

Mirroring https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.jsondaily and stores it on GitHub, since CISA restricts access and applys rate limites. This simply helps to keep everything at one place, and my automation up and running.

How it works

The magic is done with the help of this GitHub Action

How to consume it

You can simply grep the file and search in it like this:

# Store file
curl https://raw.githubusercontent.com/BenjiTrapp/cisa-known-vuln-scraper/main/cisa-kev.json -o cisa-kev.json

# Search by product name
jq -r '.vulnerabilities[] | select(.product == "FTA")' cisa-kev.json

# Search by Product name
jq -r '.vulnerabilities[] | select(.vendorProject == "Progress")' cisa-kev.json

# Search by CVE
jq -r '.vulnerabilities[] | select(.cveID == "CVE-2023-34362")' cisa-kev.json

For integration within Gradle it would look like this:

dependencyCheck {
    analyzers {
        knownExploitedURL = "https://raw.githubusercontent.com/BenjiTrapp/cisa-known-vuln-scraper/main/cisa-kev.json"
    }
}