-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathMITRE-instances.ttl
More file actions
35 lines (30 loc) · 1.14 KB
/
MITRE-instances.ttl
File metadata and controls
35 lines (30 loc) · 1.14 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
@prefix ex: <http://example.org/mitre#> .
@prefix xsd: <http://www.w3.org/2001/XMLSchema#> .
# --- Severity Levels ---
ex:LowSeverity a ex:SeverityLevel .
ex:MediumSeverity a ex:SeverityLevel .
ex:HighSeverity a ex:SeverityLevel .
ex:CriticalSeverity a ex:SeverityLevel .
# --- Example Platform ---
ex:Windows10 a ex:Platform ;
ex:hasVendor "Microsoft" ;
ex:hasProduct "Windows" ;
ex:hasVersion "10" .
# --- Example Vulnerability ---
ex:CVE_2024_12345 a ex:Vulnerability ;
ex:hasID "CVE-2024-12345" ;
ex:hasName "SQL Injection in XYZ App" ;
ex:hasDescription "Improper input validation allows attackers to execute arbitrary SQL commands." ;
ex:hasSeverityLevel ex:HighSeverity ;
ex:affectsPlatform ex:Windows10 ;
ex:listedIn ex:CVE .
# --- Example Weakness ---
ex:CWE_89 a ex:Weakness ;
ex:hasID "CWE-89" ;
ex:hasName "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" ;
ex:causesVulnerability ex:CVE_2024_12345 .
# --- Example Attack Pattern ---
ex:CAPEC_66 a ex:AttackPattern ;
ex:hasID "CAPEC-66" ;
ex:hasName "SQL Injection" ;
ex:relatedToWeakness ex:CWE_89 .