{"id":"RUSTSEC-2019-0024","summary":"Test advisory with associated example crate","details":"This is a test advisory useful for verifying RustSec tooling and vulnerability\ndetection pipelines are working correctly. Aside from the fact that it is filed\nagainst an example crate, it is otherwise considered by the Advisory Database\nitself to be a normal security advisory.\n\nIt's filed against `rustsec-example-crate`, an otherwise completely empty crate\nwith no functionality or code, which has three releases:\n\n- [v0.0.0] - *unaffected* by this advisory (but *yanked* from crates.io)\n- [v0.0.1] - *vulnerable* according to this advisory\n- [v1.0.0] - *patched* by this advisory\n\n[v0.0.0]: https://crates.io/crates/rustsec-example-crate/0.0.0\n[v0.0.1]: https://crates.io/crates/rustsec-example-crate/0.0.1\n[v1.0.0]: https://crates.io/crates/rustsec-example-crate/1.0.0","modified":"2022-11-05T17:45:24Z","published":"2019-10-08T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/rustsec-example-crate"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2019-0024.html"},{"type":"REPORT","url":"https://github.com/RustSec/advisory-db/issues/158"}],"affected":[{"package":{"name":"rustsec-example-crate","ecosystem":"crates.io","purl":"pkg:cargo/rustsec-example-crate"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.1"},{"fixed":"1.0.0"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"functions":[],"arch":[],"os":[]}},"database_specific":{"cvss":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2019-0024.json","informational":null,"categories":[]}}],"schema_version":"1.7.3"}