-
-
Notifications
You must be signed in to change notification settings - Fork 76
Structured vulnerabilities data are no longer available? #483
Comments
Can I interest you in creating a parseable format for your textual advisories? |
Also since we are discussing this, it would make sense to have an official This would make this easier for everyone and push this informal usage up to the spec https://github.com/nexB/vulnerablecode/blob/4a6734b1bbaa8df6fd816f3eb4fd843a88c1ecec/vulnerabilities/importers/openssl.py#L64 It would be better than the generic PURLs documented as examples here https://github.com/package-url/purl-spec/blob/master/PURL-TYPES.rst#generic |
We no longer maintain vulernabilities.xml since it was superseded by the json format. All the CVEs should have an equivalent json file.
I suspect that was an accidental change as a result of recent technical changes on the website. |
@mattcaswell Thanks for the explanation! To recap, ideally I would like to have:
Some details why:The data is scattered in multiple places:
Therefore:
|
@t8m anyway I can help here too? |
Hi!
Until recently, OpenSSL was publishing structured data about known vulnerabilities at:
https://www.openssl.org/news/vulnerabilities.xml and later JSON at news/secjson
The last archived copy is at https://web.archive.org/web/20230601233405/https://www.openssl.org/news/vulnerabilities.xml
Also the page listing is not longer available at https://web.archive.org/web/20221117101928/https://www.openssl.org/news/secjson/ for the CVE in JSON format as in https://www.openssl.org/news/secjson/CVE-2002-0659.json
We are/were relying on this data https://github.com/nexB/vulnerablecode/blob/4a6734b1bbaa8df6fd816f3eb4fd843a88c1ecec/vulnerabilities/importers/openssl.py#L35
It would be useful to restore some of this data to avoid having to resort to screen scraping the web site and parsing the unstructured advisory text files.
Publishing the backing git repos that contain the data would be even better.
Do you need some help there?
The text was updated successfully, but these errors were encountered: