euvd 0.1.0

API for querying recent vulnerabilities from the ENISA EUVD database.
Documentation
# Rust API client for euvd

API for querying recent vulnerabilities from the ENISA EUVD database.


## Overview

This API client was generated by the [OpenAPI Generator](https://openapi-generator.tech) project.  By using the [openapi-spec](https://openapis.org) from a remote server, you can easily generate an API client.

- API version: 0.1.0
- Package version: 0.1.0
- Generator version: 7.13.0
- Build package: `org.openapitools.codegen.languages.RustClientCodegen`

## Installation

Put the package under your project folder in a directory named `euvd` and add the following to `Cargo.toml` under `[dependencies]`:

```
euvd = { path = "./euvd" }
```

## Documentation for API Endpoints

All URIs are relative to *https://euvdservices.enisa.europa.eu*

Class | Method | HTTP request | Description
------------ | ------------- | ------------- | -------------
*DefaultApi* | [**get_advisory_by_id**]docs/DefaultApi.md#get_advisory_by_id | **GET** /api/advisory | Show advisory by ID
*DefaultApi* | [**get_by_enisa_id**]docs/DefaultApi.md#get_by_enisa_id | **GET** /api/enisaid | Show EUVD by ID
*DefaultApi* | [**get_critical_vulnerabilities**]docs/DefaultApi.md#get_critical_vulnerabilities | **GET** /api/criticalvulnerabilities | Show latest critical vulnerabilities
*DefaultApi* | [**get_exploited_vulnerabilities**]docs/DefaultApi.md#get_exploited_vulnerabilities | **GET** /api/exploitedvulnerabilities | Show latest exploited vulnerabilities
*DefaultApi* | [**get_last_vulnerabilities**]docs/DefaultApi.md#get_last_vulnerabilities | **GET** /api/lastvulnerabilities | Show latest vulnerabilities
*DefaultApi* | [**get_vulnerability_by_id**]docs/DefaultApi.md#get_vulnerability_by_id | **GET** /api/vulnerability | Show vulnerability by ID
*DefaultApi* | [**query_vulnerabilities**]docs/DefaultApi.md#query_vulnerabilities | **GET** /api/vulnerabilities | Query vulnerabilities with flexible filters


## Documentation For Models

 - [Advisory]docs/Advisory.md
 - [AdvisoryAdvisoryProductInner]docs/AdvisoryAdvisoryProductInner.md
 - [AdvisoryEnisaIdAdvisoriesInner]docs/AdvisoryEnisaIdAdvisoriesInner.md
 - [AdvisorySource]docs/AdvisorySource.md
 - [AdvisoryVulnerabilityAdvisoryInner]docs/AdvisoryVulnerabilityAdvisoryInner.md
 - [EnisaIdVulnerabilityEntry]docs/EnisaIdVulnerabilityEntry.md
 - [NestedProduct]docs/NestedProduct.md
 - [NestedVendor]docs/NestedVendor.md
 - [NestedVulnerability]docs/NestedVulnerability.md
 - [NestedVulnerabilityVulnerabilityProductInner]docs/NestedVulnerabilityVulnerabilityProductInner.md
 - [NestedVulnerabilityVulnerabilityVendorInner]docs/NestedVulnerabilityVulnerabilityVendorInner.md
 - [Vulnerabilities]docs/Vulnerabilities.md
 - [Vulnerability]docs/Vulnerability.md
 - [VulnerabilityEnisaIdProductInner]docs/VulnerabilityEnisaIdProductInner.md
 - [VulnerabilityEnisaIdProductInnerProduct]docs/VulnerabilityEnisaIdProductInnerProduct.md
 - [VulnerabilityEnisaIdVendorInner]docs/VulnerabilityEnisaIdVendorInner.md
 - [VulnerabilityWithComponents]docs/VulnerabilityWithComponents.md
 - [VulnerabilityWithRelations]docs/VulnerabilityWithRelations.md


To get access to the crate's generated documentation, use:

```
cargo doc --open
```

## Author

* seeseekey