diff --git a/README.md b/README.md index 4b91c74..d9084c1 100644 --- a/README.md +++ b/README.md @@ -60,18 +60,26 @@ This allows an attacker to Y. The flaw was corrected by Z. """ -# URL to a long-form description of this issue, e.g. a GitHub issue/PR, -# a change log entry, or a blogpost announcing the release (optional) -url = "https://github.com/mystuff/mycrate/issues/123" - -# Keywords which describe this vulnerability, similar to Cargo keywords -keywords = ["ssl", "mitm"] - # Versions which include fixes for this vulnerability (mandatory) patched_versions = [">= 1.2.0"] # Versions which were never vulnerable (optional) -unaffected_versions = ["< 1.1.0"] +#unaffected_versions = ["< 1.1.0"] + +# URL to a long-form description of this issue, e.g. a GitHub issue/PR, +# a change log entry, or a blogpost announcing the release (optional) +url = "https://github.com/mystuff/mycrate/issues/123" + +# Keywords which describe this vulnerability, similar to Cargo (optional) +keywords = ["ssl", "mitm"] + +# Vulnerability aliases, e.g. CVE IDs (optional but recommended) +# Request a CVE for your RustSec vulns: https://iwantacve.org/ +#aliases = ["CVE-2018-XXXX"] + +# References to related vulnerabilities (optional) +# e.g. CVE for a C library wrapped by a -sys crate) +#references = ["CVE-2018-YYYY", "CVE-2018-ZZZZ"] # CPU architectures impacted by this vulnerability (optional) # For a list of CPU architecture strings, see the "platforms" crate: @@ -82,14 +90,6 @@ unaffected_versions = ["< 1.1.0"] # For a list of OS strings, see the "platforms" crate: # #affected_os = ["windows"] - -# Vulnerability aliases, e.g. CVE IDs (optional but recommended) -# Request a CVE for your RustSec vulns: https://iwantacve.org/ -aliases = ["CVE-2018-XXXX"] - -# References to related vulnerabilities (optional) -# e.g. CVE for a C library wrapped by a -sys crate) -references = ["CVE-2018-YYYY", "CVE-2018-ZZZZ"] ``` ## License