You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
blank=True, help_text="UTC Date of publication of the advisory", null=True
32
-
),
33
-
),
34
-
(
35
-
"date_collected",
36
-
models.DateField(help_text="UTC Date on which the advisory was collected"),
37
-
),
38
-
(
39
-
"date_improved",
40
-
models.DateTimeField(
41
-
blank=True,
42
-
help_text="Latest date on which the advisory was improved by an improver",
43
-
null=True,
44
-
),
45
-
),
46
-
(
47
-
"created_by",
48
-
models.CharField(
49
-
help_text="Fully qualified name of the importer prefixed with the module name importing the advisory. Eg: vulnerabilities.importers.nginx.NginxDataSource",
50
-
max_length=100,
51
-
),
52
-
),
53
-
],
54
-
),
55
16
migrations.CreateModel(
56
17
name="Importer",
57
18
fields=[
@@ -155,23 +116,19 @@ class Migration(migrations.Migration):
155
116
),
156
117
(
157
118
"vulnerability_id",
158
-
models.CharField(
159
-
help_text="Unique identifier for a vulnerability: this is either a published CVE id (as in CVE-2020-7965) if it exists. Otherwise this is a VulnerableCode-assigned VULCOID (as in VULCOID-20210222-1315-16461541). When a vulnerability CVE is assigned later we replace this with the CVE and keep the 'old' VULCOID in the 'old_vulnerability_id' field to support redirection to the CVE id.",
160
-
max_length=50,
119
+
models.UUIDField(
120
+
default=uuid.uuid4,
121
+
editable=False,
122
+
help_text="Unique identifier for a vulnerability in this database, assigned automatically. In the external representation it is prefixed with VULCOID-",
161
123
unique=True,
162
124
),
163
125
),
164
126
(
165
-
"old_vulnerability_id",
166
-
models.CharField(
167
-
blank=True,
168
-
help_text="empty if no CVE else VC id",
169
-
max_length=50,
170
-
null=True,
171
-
unique=True,
127
+
"summary",
128
+
models.TextField(
129
+
blank=True, help_text="Summary of the vulnerability", null=True
172
130
),
173
131
),
174
-
("summary", models.TextField(blank=True, help_text="Summary of the vulnerability")),
175
132
],
176
133
options={
177
134
"verbose_name_plural": "Vulnerabilities",
@@ -226,7 +183,7 @@ class Migration(migrations.Migration):
226
183
"created_by",
227
184
models.CharField(
228
185
blank=True,
229
-
help_text="Fully qualified name of the improver prefixed with the module name responsible for creating this relation. Eg:vulnerabilities.importers.nginx.NginxTimeTravel",
186
+
help_text="Fully qualified name of the improver prefixed with themodule name responsible for creating this relation. Eg:vulnerabilities.importers.nginx.NginxBasicImprover",
230
187
max_length=100,
231
188
),
232
189
),
@@ -266,7 +223,6 @@ class Migration(migrations.Migration):
help_text="A list of serializable AffectedPackage objects",
284
+
),
285
+
),
286
+
(
287
+
"references",
288
+
models.JSONField(
289
+
blank=True,
290
+
default=list,
291
+
help_text="A list of serializable Reference objects",
292
+
),
293
+
),
294
+
(
295
+
"date_published",
296
+
models.DateTimeField(
297
+
blank=True, help_text="UTC Date of publication of the advisory", null=True
298
+
),
299
+
),
300
+
(
301
+
"date_collected",
302
+
models.DateTimeField(help_text="UTC Date on which the advisory was collected"),
303
+
),
304
+
(
305
+
"date_improved",
306
+
models.DateTimeField(
307
+
blank=True,
308
+
help_text="Latest date on which the advisory was improved by an improver",
309
+
null=True,
310
+
),
311
+
),
312
+
(
313
+
"created_by",
314
+
models.CharField(
315
+
help_text="Fully qualified name of the importer prefixed with themodule name importing the advisory. Eg:vulnerabilities.importers.nginx.NginxDataSource",
help_text="identifier for the scoring system used. Available choices are: cvssv2 is vulnerability_id for CVSSv2 Base Score system, cvssv2_vector is vulnerability_id for CVSSv2 Vector system, cvssv3 is vulnerability_id for CVSSv3 Base Score system, cvssv3_vector is vulnerability_id for CVSSv3 Vector system, cvssv3.1 is vulnerability_id for CVSSv3.1 Base Score system, cvssv3.1_vector is vulnerability_id for CVSSv3.1 Vector system, rhbs is vulnerability_id for RedHat Bugzilla severity system, rhas is vulnerability_id for RedHat Aggregate severity system, avgs is vulnerability_id for Archlinux Vulnerability Group Severity system, cvssv3.1_qr is vulnerability_id for CVSSv3.1 Qualitative Severity Rating system, generic_textual is vulnerability_id for Generic textual severity rating system, apache_httpd is vulnerability_id for Apache Httpd Severity system ",
352
+
help_text="Identifier for the scoring system used. Available choices are: cvssv2 is vulnerability_id for CVSSv2 Base Score system, cvssv2_vector is vulnerability_id for CVSSv2 Vector system, cvssv3 is vulnerability_id for CVSSv3 Base Score system, cvssv3_vector is vulnerability_id for CVSSv3 Vector system, cvssv3.1 is vulnerability_id for CVSSv3.1 Base Score system, cvssv3.1_vector is vulnerability_id for CVSSv3.1 Vector system, rhbs is vulnerability_id for RedHat Bugzilla severity system, rhas is vulnerability_id for RedHat Aggregate severity system, avgs is vulnerability_id for Archlinux Vulnerability Group Severity system, cvssv3.1_qr is vulnerability_id for CVSSv3.1 Qualitative Severity Rating system, generic_textual is vulnerability_id for Generic textual severity rating system, apache_httpd is vulnerability_id for Apache Httpd Severity system ",
0 commit comments