Link to reference documentation on available categories

This commit is contained in:
Dirkjan Ochtman
2025-12-08 11:06:26 +01:00
parent eb1f940aab
commit d0bdb37b2b
2 changed files with 5 additions and 6 deletions

View File

@@ -7,8 +7,7 @@ date = "2020-01-31"
url = "https://example.com"
#references = ["https://github.com/mystuff/mycrate/discussions/1"]
#informational = "unmaintained"
# Valid categories: "code-execution", "crypto-failure", "denial-of-service", "file-disclosure"
# "format-injection", "memory-corruption", "memory-exposure", "privilege-escalation"
# See https://docs.rs/rustsec/latest/rustsec/advisory/enum.Category.html
categories = ["code-execution", "privilege-escalation"]
#cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
keywords = ["example", "freeform", "keywords"]

View File

@@ -75,9 +75,9 @@ url = "https://github.com/mystuff/mycrate/issues/123"
# - "notice" for other informational notices
#informational = "unmaintained"
# Optional: Categories this advisory falls under. Valid categories are:
# "code-execution", "crypto-failure", "denial-of-service", "file-disclosure"
# "format-injection", "memory-corruption", "memory-exposure", "privilege-escalation"
# Optional: Categories this advisory falls under.
#
# See <https://docs.rs/rustsec/latest/rustsec/advisory/enum.Category.html>.
categories = ["crypto-failure"]
# Optional: a Common Vulnerability Scoring System score. More information