|
|
|
@ -23,7 +23,7 @@ it out with the correct data. |
|
|
|
|
Blank template: |
|
|
|
|
|
|
|
|
|
```yml |
|
|
|
|
- vendor: '' |
|
|
|
|
- vendor: '' |
|
|
|
|
product: '' |
|
|
|
|
cves: |
|
|
|
|
cve-2021-4104: |
|
|
|
@ -74,8 +74,8 @@ given there are no patched versions available for this entry. |
|
|
|
|
Entry example: |
|
|
|
|
|
|
|
|
|
```yml |
|
|
|
|
- vendor: CISA |
|
|
|
|
product: Product |
|
|
|
|
- vendor: Example Vendor |
|
|
|
|
product: Example Product |
|
|
|
|
cves: |
|
|
|
|
cve-2021-4104: |
|
|
|
|
investigated: false |
|
|
|
@ -91,17 +91,17 @@ Entry example: |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
investigated: '' |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45105: |
|
|
|
|
investigated: false |
|
|
|
|
investigated: '' |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
vendor_links: |
|
|
|
|
- https://example.org/ |
|
|
|
|
- https://www.example.org/ |
|
|
|
|
notes: Contains vulnerable code but not likely to get |
|
|
|
|
unauthenticated user input to the log4j component. |
|
|
|
|
references: |
|
|
|
|