From b7b97960a60d918de4bbe4fc312ba058c48f5303 Mon Sep 17 00:00:00 2001 From: Jeremy Long Date: Sat, 22 Oct 2016 07:11:36 -0400 Subject: [PATCH] improvements to the vulnerability report per issue #599 --- .../src/main/resources/templates/VulnerabilityReport.vsl | 9 +++++++-- src/site/markdown/general/suppression.md | 2 +- 2 files changed, 8 insertions(+), 3 deletions(-) diff --git a/dependency-check-core/src/main/resources/templates/VulnerabilityReport.vsl b/dependency-check-core/src/main/resources/templates/VulnerabilityReport.vsl index 4b0036c14..f0ee4806f 100644 --- a/dependency-check-core/src/main/resources/templates/VulnerabilityReport.vsl +++ b/dependency-check-core/src/main/resources/templates/VulnerabilityReport.vsl @@ -177,6 +177,11 @@ the reporting provided constitutes acceptance for use in an AS IS condition, and implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

+

About The Vulnerability Report | Getting Help: google group | +github issues

+

This report is intended to be a quick summary of findings. It is highly recommended that you use the full HTML +report to determine if any false positives +have been reported. Additionally, the HTML report provides many features not found in the vulnerability report.

]]#

Vulnerability Report for $enc.html($applicationName)

Report Generated On: $scanDate

@@ -222,10 +227,10 @@ arising out of or in connection with the use of this tool, the analysis performe ($vuln.cvssScore) #set($cnt=$cnt+1) #if($dependency.getRelatedDependencies().size()>0)