Low Severity
Published: Jul 16, 2025

[GitHub] go-euvd

Other
Type
N/A
CVSS Score
1
Views
Anonymous
Author

Description

Comprehensive and zero dependency Go library for the ENISA EU Vulnerability Database (EUVD) API. Instantly access real-time vulnerability data, security advisories, CVSS scores, and more.

# go-euvd

[![Go Reference](https://pkg.go.dev/badge/github.com/kaansk/go-euvd.svg)](https://pkg.go.dev/github.com/kaansk/go-euvd)
[![Go Report Card](https://goreportcard.com/badge/github.com/kaansk/go-euvd)](https://goreportcard.com/report/github.com/kaansk/go-euvd)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)

A comprehensive Go client library for the **ENISA EU Vulnerability Database (EUVD)** API, providing access to vulnerability data, security advisories, and threat intelligence.

> [!IMPORTANT]
> **Implementation Notes & API Behavior**
>
> - **Opinionated Data Handling:** This library takes a pragmatic approach to data returned by the remote API. For example, some fields are returned as single strings with embedded `\n` newlines. The library automatically parses these into Go string slices, providing a more idiomatic and convenient interface for consumers.
>
> - **Remote Search API Limitations:** While this library fully implements the official EUVD API specification, it has been observed that the remote search functionality has issues. Certain query parameter combinations (e.g., using `vendor` together with `toScore` or `fromScore`) may result in some parameters being ignored or omitted by the remote service. This is a limitation of the upstream API, not the client library.
>
> In case the mentioned shortcomings are implementation related, feel free to open an issue.

---

## Data Source
The [**ENISA EU Vulnerability Database**](https://euvd.enisa.europa.eu/) serves as the European Union's central repository. Api documentation is provided via [**Official API Documentation**](https://euvd.enisa.europa.eu/apidoc). API offers:

- **Real-time vulnerability data** from multiple sources
- **Security advisories** from vendors and security organizations
- **CVSS scores** and exploitability metrics (EPSS)
- **Product and vendor mappings** for affected systems
- **Exploitation status** and timeline inform

Community Rating
0

Login to rate this exploit

Quick Actions