mirror of
https://github.com/gocsaf/csaf.git
synced 2025-12-22 05:40:11 +01:00
commit990c74a1a6Merge:86d7ce17824f3bAuthor: koplas <pschwabauer@intevation.de> Date: Fri Nov 22 16:58:46 2024 +0100 Merge branch 'sha-handling' into unittest commit86d7ce13dcMerge:a6807d279b8900Author: koplas <pschwabauer@intevation.de> Date: Fri Nov 22 16:54:45 2024 +0100 Merge branch 'sha-handling' into unittest commit79b89009ddAuthor: koplas <pschwabauer@intevation.de> Date: Fri Nov 22 16:31:56 2024 +0100 Improve hash fetching and logging commita6807d24d6Merge:ddb5518d18d2c3Author: koplas <pschwabauer@intevation.de> Date: Fri Nov 22 16:51:55 2024 +0100 Merge branch 'sha-handling' into unittest commitd18d2c3bf1Author: koplas <pschwabauer@intevation.de> Date: Fri Nov 22 16:31:56 2024 +0100 Improve hash fetching and logging commitddb5518c6dAuthor: koplas <54645365+koplas@users.noreply.github.com> Date: Tue Sep 17 10:45:25 2024 +0200 Extend SHA marking tests commit13c94f4fa0Author: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 20:46:31 2024 +0200 Use temp directory for downloads commit1819b4896bAuthor: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 20:37:55 2024 +0200 Fix rolie feed commit989e3667baAuthor: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 20:23:22 2024 +0200 Fix provider-metadata.json commit714735d74aAuthor: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 20:08:21 2024 +0200 Implement provider handler commitd488e39947Author: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 16:26:37 2024 +0200 Add info about gpg key commita9bf9da130Author: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 16:12:49 2024 +0200 Rename directory testdata commit6ca6dfee25Author: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 16:01:41 2024 +0200 Add initial downloader tests commit20bee797c6Author: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 15:58:31 2024 +0200 Fix: Remove unecessary error print commit8e4e508073Author: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 14:50:48 2024 +0200 Extend links test commit3ba29f94deAuthor: koplas <pschwabauer@intevation.de> Date: Mon Sep 16 14:11:14 2024 +0200 Add initial directory feed testdata commitdee55aafd9Author: koplas <54645365+koplas@users.noreply.github.com> Date: Mon Sep 16 10:47:32 2024 +0200 Add initial testdata commitcd9338ae72Author: koplas <54645365+koplas@users.noreply.github.com> Date: Thu Sep 12 15:54:42 2024 +0200 Add initial download unittests
170 lines
4.1 KiB
JSON
170 lines
4.1 KiB
JSON
{
|
|
"document": {
|
|
"category": "csaf_vex",
|
|
"csaf_version": "2.0",
|
|
"distribution": {
|
|
"tlp": {
|
|
"label": "WHITE",
|
|
"url": "https://www.first.org/tlp/v1/"
|
|
}
|
|
},
|
|
"notes": [
|
|
{
|
|
"category": "summary",
|
|
"title": "Test document summary",
|
|
"text": "Auto generated test CSAF document"
|
|
}
|
|
],
|
|
"publisher": {
|
|
"category": "vendor",
|
|
"name": "ACME Inc.",
|
|
"namespace": "https://www.example.com"
|
|
},
|
|
"title": "Test CSAF document",
|
|
"tracking": {
|
|
"current_release_date": "2020-01-01T00:00:00Z",
|
|
"generator": {
|
|
"date": "2020-01-01T00:00:00Z",
|
|
"engine": {
|
|
"name": "csaf-tool",
|
|
"version": "0.3.2"
|
|
}
|
|
},
|
|
"id": "Avendor-advisory-0004",
|
|
"initial_release_date": "2020-01-01T00:00:00Z",
|
|
"revision_history": [
|
|
{
|
|
"date": "2020-01-01T00:00:00Z",
|
|
"number": "1",
|
|
"summary": "Initial version"
|
|
}
|
|
],
|
|
"status": "final",
|
|
"version": "1"
|
|
}
|
|
},
|
|
"product_tree": {
|
|
"branches": [
|
|
{
|
|
"category": "vendor",
|
|
"name": "AVendor",
|
|
"branches": [
|
|
{
|
|
"category": "product_name",
|
|
"name": "product_1",
|
|
"branches": [
|
|
{
|
|
"category": "product_version",
|
|
"name": "1.1",
|
|
"product": {
|
|
"name": "AVendor product_1 1.1",
|
|
"product_id": "CSAFPID_0001"
|
|
}
|
|
},
|
|
{
|
|
"category": "product_version",
|
|
"name": "1.2",
|
|
"product": {
|
|
"name": "AVendor product_1 1.2",
|
|
"product_id": "CSAFPID_0002"
|
|
}
|
|
},
|
|
{
|
|
"category": "product_version",
|
|
"name": "2.0",
|
|
"product": {
|
|
"name": "AVendor product_1 2.0",
|
|
"product_id": "CSAFPID_0003"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"category": "vendor",
|
|
"name": "AVendor1",
|
|
"branches": [
|
|
{
|
|
"category": "product_name",
|
|
"name": "product_2",
|
|
"branches": [
|
|
{
|
|
"category": "product_version",
|
|
"name": "1",
|
|
"product": {
|
|
"name": "AVendor1 product_2 1",
|
|
"product_id": "CSAFPID_0004"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"category": "vendor",
|
|
"name": "AVendor",
|
|
"branches": [
|
|
{
|
|
"category": "product_name",
|
|
"name": "product_3",
|
|
"branches": [
|
|
{
|
|
"category": "product_version",
|
|
"name": "2022H2",
|
|
"product": {
|
|
"name": "AVendor product_3 2022H2",
|
|
"product_id": "CSAFPID_0005"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"vulnerabilities": [
|
|
{
|
|
"cve": "CVE-2020-1234",
|
|
"notes": [
|
|
{
|
|
"category": "description",
|
|
"title": "CVE description",
|
|
"text": "https://nvd.nist.gov/vuln/detail/CVE-2020-1234"
|
|
}
|
|
],
|
|
"product_status": {
|
|
"under_investigation": ["CSAFPID_0001"]
|
|
},
|
|
"threats": [
|
|
{
|
|
"category": "impact",
|
|
"details": "Customers should upgrade to the latest version of the product",
|
|
"date": "2020-01-01T00:00:00Z",
|
|
"product_ids": ["CSAFPID_0001"]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"cve": "CVE-2020-9876",
|
|
"notes": [
|
|
{
|
|
"category": "description",
|
|
"title": "CVE description",
|
|
"text": "https://nvd.nist.gov/vuln/detail/CVE-2020-9876"
|
|
}
|
|
],
|
|
"product_status": {
|
|
"under_investigation": ["CSAFPID_0001"]
|
|
},
|
|
"threats": [
|
|
{
|
|
"category": "impact",
|
|
"details": "Still under investigation",
|
|
"date": "2020-01-01T00:00:00Z",
|
|
"product_ids": ["CSAFPID_0001"]
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|