# Rust API client for euvd
API for querying recent vulnerabilities from the ENISA EUVD database.
## Overview
This API client was generated by the [OpenAPI Generator](https://openapi-generator.tech) project. By using the [openapi-spec](https://openapis.org) from a remote server, you can easily generate an API client.
- API version: 0.1.0
- Package version: 0.1.0
- Generator version: 7.13.0
- Build package: `org.openapitools.codegen.languages.RustClientCodegen`
## Installation
Put the package under your project folder in a directory named `euvd` and add the following to `Cargo.toml` under `[dependencies]`:
```
euvd = { path = "./euvd" }
```
## Documentation for API Endpoints
All URIs are relative to *https://euvdservices.enisa.europa.eu*
*DefaultApi* | [**get_advisory_by_id**](docs/DefaultApi.md#get_advisory_by_id) | **GET** /api/advisory | Show advisory by ID
*DefaultApi* | [**get_by_enisa_id**](docs/DefaultApi.md#get_by_enisa_id) | **GET** /api/enisaid | Show EUVD by ID
*DefaultApi* | [**get_critical_vulnerabilities**](docs/DefaultApi.md#get_critical_vulnerabilities) | **GET** /api/criticalvulnerabilities | Show latest critical vulnerabilities
*DefaultApi* | [**get_exploited_vulnerabilities**](docs/DefaultApi.md#get_exploited_vulnerabilities) | **GET** /api/exploitedvulnerabilities | Show latest exploited vulnerabilities
*DefaultApi* | [**get_last_vulnerabilities**](docs/DefaultApi.md#get_last_vulnerabilities) | **GET** /api/lastvulnerabilities | Show latest vulnerabilities
*DefaultApi* | [**get_vulnerability_by_id**](docs/DefaultApi.md#get_vulnerability_by_id) | **GET** /api/vulnerability | Show vulnerability by ID
*DefaultApi* | [**query_vulnerabilities**](docs/DefaultApi.md#query_vulnerabilities) | **GET** /api/vulnerabilities | Query vulnerabilities with flexible filters
## Documentation For Models
- [Advisory](docs/Advisory.md)
- [AdvisoryAdvisoryProductInner](docs/AdvisoryAdvisoryProductInner.md)
- [AdvisoryEnisaIdAdvisoriesInner](docs/AdvisoryEnisaIdAdvisoriesInner.md)
- [AdvisorySource](docs/AdvisorySource.md)
- [AdvisoryVulnerabilityAdvisoryInner](docs/AdvisoryVulnerabilityAdvisoryInner.md)
- [EnisaIdVulnerabilityEntry](docs/EnisaIdVulnerabilityEntry.md)
- [NestedProduct](docs/NestedProduct.md)
- [NestedVendor](docs/NestedVendor.md)
- [NestedVulnerability](docs/NestedVulnerability.md)
- [NestedVulnerabilityVulnerabilityProductInner](docs/NestedVulnerabilityVulnerabilityProductInner.md)
- [NestedVulnerabilityVulnerabilityVendorInner](docs/NestedVulnerabilityVulnerabilityVendorInner.md)
- [Vulnerabilities](docs/Vulnerabilities.md)
- [Vulnerability](docs/Vulnerability.md)
- [VulnerabilityEnisaIdProductInner](docs/VulnerabilityEnisaIdProductInner.md)
- [VulnerabilityEnisaIdProductInnerProduct](docs/VulnerabilityEnisaIdProductInnerProduct.md)
- [VulnerabilityEnisaIdVendorInner](docs/VulnerabilityEnisaIdVendorInner.md)
- [VulnerabilityWithComponents](docs/VulnerabilityWithComponents.md)
- [VulnerabilityWithRelations](docs/VulnerabilityWithRelations.md)
To get access to the crate's generated documentation, use:
```
cargo doc --open
```
## Author
* seeseekey