From 5cd4c368ee93a8863e4cde35c2a07ce440508872 Mon Sep 17 00:00:00 2001 From: "John M. Horan" Date: Wed, 25 Jan 2023 08:30:09 -0800 Subject: [PATCH] Add note re loop through list of aliases #1079 Reference: https://github.com/nexB/vulnerablecode/issues/1079 Signed-off-by: John M. Horan --- vulnerabilities/importer.py | 3 +++ 1 file changed, 3 insertions(+) diff --git a/vulnerabilities/importer.py b/vulnerabilities/importer.py index 87662aa50..28a00675d 100644 --- a/vulnerabilities/importer.py +++ b/vulnerabilities/importer.py @@ -447,6 +447,9 @@ def get_data_from_xml_doc( print("\ndefinition_data = {}\n".format(definition_data)) # These fields are definition level, i.e common for all elements # connected/linked to an OvalDefinition + + # TODO: 2023-01-24 Tuesday 22:34:20. Is this where we'd loop through the list of CVEs/aliases? + vuln_id = definition_data["vuln_id"] description = definition_data["description"]