diff --git a/gost/microsoft.go b/gost/microsoft.go index 05cda0aa..6b2853b1 100644 --- a/gost/microsoft.go +++ b/gost/microsoft.go @@ -70,11 +70,10 @@ func (ms Microsoft) ConvertToModel(cve *gostmodels.MicrosoftCVE) (*models.CveCon option := map[string]string{} if 0 < len(cve.ExploitStatus) { + // TODO: CVE-2020-0739 + // "exploit_status": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A", option["exploit"] = cve.ExploitStatus } - if 0 < len(cve.Workaround) { - option["workaround"] = cve.Workaround - } kbids := []string{} for _, kbid := range cve.KBIDs { kbids = append(kbids, kbid.KBID) @@ -86,13 +85,18 @@ func (ms Microsoft) ConvertToModel(cve *gostmodels.MicrosoftCVE) (*models.CveCon vendorURL := "https://msrc.microsoft.com/update-guide/vulnerability/" + cve.CveID mitigations := []models.Mitigation{} if cve.Mitigation != "" { - mitigations = []models.Mitigation{ - { - CveContentType: models.Microsoft, - Mitigation: cve.Mitigation, - URL: vendorURL, - }, - } + mitigations = append(mitigations, models.Mitigation{ + CveContentType: models.Microsoft, + Mitigation: cve.Mitigation, + URL: vendorURL, + }) + } + if cve.Workaround != "" { + mitigations = append(mitigations, models.Mitigation{ + CveContentType: models.Microsoft, + Mitigation: cve.Workaround, + URL: vendorURL, + }) } return &models.CveContent{ diff --git a/vuls b/vuls new file mode 100755 index 00000000..0beca544 Binary files /dev/null and b/vuls differ