default/cve/render.pug (168 lines of code) (raw):
extends ../../views/render.pug
block prepend content
mixin slide(cve)
.page.wht.shd.pad2.gap
b.slideTitle
if cve.source && cve.source.advisory
= cve.source.advisory
|
= cve.CVE_data_meta.TITLE + ' (' + cve.CVE_data_meta.ID + ')'
ul.bullets
li
b.term CVSS:
span.text
if cve.impact && cve.impact.cvss
+CVSS(cve.impact.cvss)
li
b.term PR:
span.text= cve.source.defect
li
b.term Affects:
span.text= getProductAffected(cve)
li
b.term Problem:
span.text
+mpara(cve.description.description_data.slice(0,1))
if cmap && Object.keys(cmap).length > 0 && cmap.constructor === Object
+mpara(cve.CNA_private.CVE_table_description)
each x, id in cmap
= id + " "
li
b.term Workaround:
span.text
+mpara(cve.work_around)
li
b.term Solution:
span.text
+mpara(cve.solution)
block pageDef
mixin page(cve)
- var sourceText = {"INTERNAL":"This issue was found during internal product security testing or research.", "EXTERNAL":"This issue was discovered during an external security research.", "USER":"This issue was seen during production usage.", "UNKNOWN":""};
- var CDM = cve.CVE_data_meta;
- var cveid = CDM.ID.match(/^CVE-[0-9-]+$/)? CDM.ID : 'CVE-yyyy-nnnn';
h2
if cve.source && cve.source.advisory
= cve.source.advisory
|
= CDM.TITLE + ' (' + cveid + ')'
h4 PRODUCT AFFECTED:
p= getProductAffected(cve)
h4 PROBLEM:
if cve.impact
for r in cve.impact
p= "Severity: " + r.other
+mpara(cve.description.description_data)
+mpara(cve.configuration)
+mpara(cve.exploit)
if cve.source
if sourceText[cve.source.discovery]
p=sourceText[cve.source.discovery]
if CDM.AKA
p This issue is also known as
= CDM.AKA
|.
if cmap && Object.keys(cmap).length > 0 && cmap.constructor === Object
+mpara(cve.CNA_private.CVE_table_description)
table.striped
tr.rowHead
th CVE
th CVSS
th Summary
each x, id in cmap
tr
td=id
td
if cmap[id] && cmap[id].impact
+CVSS(cmap[id].impact.cvss)
td
if cmap[id] && cmap[id].summary
=cmap[id].summary
else
p This issue has been assigned
a(href="https://www.cve.org/CVERecord?id="+cveid target="_blank")=cveid
|.
if cve.solution && cve.solution.length > 0
h4 SOLUTION:
+mpara(cve.solution)
if cve.source.defect && cve.source.defect.length > 0
p This issue is being tracked as
+linklist(cve.source.defect, defectURL)
|.
if cve.work_around && cve.work_around.length > 0
h4 WORKAROUND:
+mpara(cve.work_around)
h4 MODIFICATION HISTORY:
p
ul
li
+renderDate(CDM.DATE_PUBLIC)
| : Initial Publication.
h4 RELATED LINKS:
ul
if CDM.ID
li
a(href="https://www.cve.org/CVERecord?id="+cveid target="_blank")=cveid + " at cve.org"
each r in cve.references.reference_data
li
a(href=r.url)=r.url
if cve.impact && cve.impact.cvss
h4 CVSS SCORE:
p
+CVSS(cve.impact.cvss)
if cve.impact.cvss.baseSeverity
h4 RISK LEVEL:
p=cve.impact.cvss.baseSeverity
if cve.credit && cve.credit.length > 0
h4 ACKNOWLEDGEMENTS:
ul
each c in cve.credit
li= c.value
if cve.CNA_private && cve.CNA_private.internal_comments
h4 INTERNAL COMMENTS:
p
+para(cve.CNA_private.internal_comments)
mixin mitre(cve)
h2 MITRE CVE entry preview
#GeneratedTable
table(cellpadding=0,cellspacing=0,border=0)
tbody
tr
th(colspan=2) CVE-ID
tr
td(nowrap="nowrap")
h2=cve.CVE_data_meta.ID
td.ltgreybackground
.larger
a Learn more at National Vulnerability Database (NVD)
.smaller • Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
tr
th(colspan=2) Description
tr
td(colspan=2)
each d in cve.description.description_data
=d.value
= ' '
tr
th(colspan=2) References
tr
td.note(colspan=2)
b Note:
a References
| are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
tr
td(colspan=2)
ul
each r in cve.references.reference_data
li
a(target="_blank",href=r.url)=r.url
tr
th(colspan=2) Assigning CNA
tr
td(colspan=2)=cve.CVE_data_meta.ASSIGNER
| (MITRE uses CNA name instead of email address)
tr
th(colspan=2) Date Entry Created
tr
td
b YYYYMMDD
td.ltgreybackground Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.