Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type CVE ¶
type CVE struct {
Entries []Entry `xml:"entry"`
}
func Get_CVE_feed ¶
func Unmarshal_CVE ¶
type CWE ¶
type CWE struct {
Weaknesses []Weakness `xml:"Weaknesses>Weakness"`
}
func Unmarshal_CWE ¶
type Cvss ¶
type Cvss struct { Score string `xml:"base_metrics>score"` Access_Vector string `xml:"base_metrics>access-vector"` Access_Complexity string `xml:"base_metrics>access-complexity"` Authentication string `xml:"base_metrics>authentication"` Confidentiality_Impact string `xml:"base_metrics>confidentiality-impact"` Integrity_Impact string `xml:"base_metrics>integrity-impact"` Availability_Impact string `xml:"base_metrics>availability-impact"` Source string `xml:"base_metrics>source"` Generated_On time.Time `xml:"base_metrics>generated-on-datetime"` }
type Cwe ¶
To use a>b,attr directly in Entry would have been cleaner, but Unmarshal doesn't support that
type Entry ¶
type Entry struct { Id string `xml:"cve-id"` Products []string `xml:"vulnerable-software-list>product"` Published time.Time `xml:"published-datetime"` Last_Modified time.Time `xml:"last-modified-datetime"` CVSS Cvss `xml:"cvss"` CWE Cwe `xml:"cwe"` References []Reference `xml:"references"` Summary string `xml:"summary"` }
Ignored elements: vuln:vulnerable-configuration, most often just repeats vuln:vulnerable-software-list
type Reference ¶
type Reference struct { Type string `xml:"reference_type,attr"` Source string `xml:"source"` Target Reference_Target `xml:"reference"` }
type Reference_Target ¶
Click to show internal directories.
Click to hide internal directories.