mirror of
https://github.com/ysoftdevs/DependencyCheck.git
synced 2026-03-30 05:42:10 +02:00
updated report template
This commit is contained in:
@@ -1,6 +1,5 @@
|
|||||||
{
|
{
|
||||||
"reportSchema": "1.0",
|
"reportSchema": "1.0",
|
||||||
"analysis": {
|
|
||||||
"scanInfo": {
|
"scanInfo": {
|
||||||
"engineVersion": "$version",
|
"engineVersion": "$version",
|
||||||
"dataSource": [
|
"dataSource": [
|
||||||
@@ -110,8 +109,7 @@
|
|||||||
]
|
]
|
||||||
#if($dependency.getVulnerabilities().size()>0 || $dependency.getSuppressedVulnerabilities().size()>0)
|
#if($dependency.getVulnerabilities().size()>0 || $dependency.getSuppressedVulnerabilities().size()>0)
|
||||||
,"vulnerabilities": [
|
,"vulnerabilities": [
|
||||||
#foreach($vuln in $dependency.getVulnerabilities())
|
#foreach($vuln in $dependency.getVulnerabilities())#if($foreach.count > 1),#end {
|
||||||
#if($foreach.count > 1),#end {
|
|
||||||
"name": "$enc.json($vuln.name)",
|
"name": "$enc.json($vuln.name)",
|
||||||
"cvssScore": "$vuln.cvssScore",
|
"cvssScore": "$vuln.cvssScore",
|
||||||
"cvssAccessVector": "$enc.json($vuln.cvssAccessVector)",
|
"cvssAccessVector": "$enc.json($vuln.cvssAccessVector)",
|
||||||
@@ -120,36 +118,29 @@
|
|||||||
"cvssConfidentialImpact": "$enc.json($vuln.cvssConfidentialityImpact)",
|
"cvssConfidentialImpact": "$enc.json($vuln.cvssConfidentialityImpact)",
|
||||||
"cvssIntegrityImpact": "$enc.json($vuln.cvssIntegrityImpact)",
|
"cvssIntegrityImpact": "$enc.json($vuln.cvssIntegrityImpact)",
|
||||||
"cvssAvailabilityImpact": "$enc.json($vuln.cvssAvailabilityImpact)",
|
"cvssAvailabilityImpact": "$enc.json($vuln.cvssAvailabilityImpact)",
|
||||||
#if ($vuln.cvssScore<4.0)
|
#if ($vuln.cvssScore<4.0)"severity": "Low",
|
||||||
"severity": "Low",
|
#elseif ($vuln.cvssScore>=7.0)"severity": "High",
|
||||||
#elseif ($vuln.cvssScore>=7.0)
|
#else "severity": "Medium",#end
|
||||||
"severity": "High",
|
"cwe": "#if ($vuln.cwe)$enc.json($vuln.cwe)#end",
|
||||||
#else
|
|
||||||
"severity": "Medium",
|
|
||||||
#end
|
|
||||||
#if($vuln.cwe)"cwe": "$enc.json($vuln.cwe)",#end
|
|
||||||
"description": "$enc.json($vuln.description)",
|
"description": "$enc.json($vuln.description)",
|
||||||
#if ($vuln.notes)"notes": "$enc.json($vuln.notes)"#end
|
"notes": "#if ($vuln.notes)$enc.json($vuln.notes)#end",
|
||||||
"references": [
|
"references": [
|
||||||
#foreach($ref in $vuln.getReferences())
|
#foreach($ref in $vuln.getReferences())
|
||||||
#if($foreach.count > 1),#end {
|
#if($foreach.count > 1),#end {
|
||||||
"source": "$enc.json($ref.source)",
|
"source": "$enc.json($ref.source)",
|
||||||
"url": "$enc.json($ref.url)",
|
"url": "$enc.json($ref.url)",
|
||||||
"name": "$enc.json($ref.name)"
|
"name": "$enc.json($ref.name)"
|
||||||
}
|
}#end
|
||||||
#end
|
|
||||||
],
|
],
|
||||||
"vulnerableSoftware": [
|
"vulnerableSoftware": [
|
||||||
#foreach($vs in $vuln.getVulnerableSoftware())
|
#foreach($vs in $vuln.getVulnerableSoftware())
|
||||||
#if($foreach.count > 1),#end {
|
#if($foreach.count > 1),#end {
|
||||||
#if($vs.hasPreviousVersion()) "allPreviousVersion": "true",#end
|
|
||||||
"software": "$enc.json($vs.name)"
|
"software": "$enc.json($vs.name)"
|
||||||
}
|
#if($vs.hasPreviousVersion()) ,"allPreviousVersion": "true"#end
|
||||||
#end
|
|
||||||
]
|
|
||||||
}#end
|
}#end
|
||||||
]
|
]
|
||||||
#end
|
}#end
|
||||||
|
]#end
|
||||||
|
|
||||||
#if($dependency.getSuppressedVulnerabilities().size()>0 || $dependency.getSuppressedVulnerabilities().size()>0)
|
#if($dependency.getSuppressedVulnerabilities().size()>0 || $dependency.getSuppressedVulnerabilities().size()>0)
|
||||||
,"suppressedVulnerabilities": [
|
,"suppressedVulnerabilities": [
|
||||||
@@ -166,33 +157,26 @@
|
|||||||
#elseif ($vuln.cvssScore>=7.0) "severity": "High",
|
#elseif ($vuln.cvssScore>=7.0) "severity": "High",
|
||||||
#else "severity": "Medium",
|
#else "severity": "Medium",
|
||||||
#end
|
#end
|
||||||
#if ($vuln.cwe)"cwe": "$enc.json($vuln.cwe)",#end
|
"cwe": "#if ($vuln.cwe)$enc.json($vuln.cwe)#end",
|
||||||
"description": "$enc.json($vuln.description)"
|
"description": "$enc.json($vuln.description)",
|
||||||
#if ($vuln.notes),"notes": "$enc.json($vuln.notes)"#end
|
"notes": "#if ($vuln.notes)$enc.json($vuln.notes)#end",
|
||||||
,"references": [
|
"references": [
|
||||||
#foreach($ref in $vuln.getReferences())
|
#foreach($ref in $vuln.getReferences())
|
||||||
#if($foreach.count > 1),#end {
|
#if($foreach.count > 1),#end {
|
||||||
"source": "$enc.json($ref.source)",
|
"source": "$enc.json($ref.source)",
|
||||||
"url": "$enc.json($ref.url)",
|
"url": "$enc.json($ref.url)",
|
||||||
"name": "$enc.json($ref.name)"
|
"name": "$enc.json($ref.name)"
|
||||||
}
|
}#end
|
||||||
#end
|
|
||||||
],
|
],
|
||||||
"vulnerableSoftware": [
|
"vulnerableSoftware": [
|
||||||
#foreach($vs in $vuln.getVulnerableSoftware())
|
#foreach($vs in $vuln.getVulnerableSoftware())
|
||||||
#if($foreach.count > 1),#end {
|
#if($foreach.count > 1),#end {
|
||||||
#if($vs.hasPreviousVersion()) "allPreviousVersion": "true",#end
|
|
||||||
"name": "$enc.json($vs.name)"
|
"name": "$enc.json($vs.name)"
|
||||||
}
|
#if($vs.hasPreviousVersion()) ,"allPreviousVersion": "true"#end
|
||||||
#end
|
}#end
|
||||||
|
]
|
||||||
|
}#end
|
||||||
|
]#end
|
||||||
|
}#end
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
#end
|
|
||||||
]
|
|
||||||
#end
|
|
||||||
|
|
||||||
}
|
|
||||||
#end
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|||||||
Reference in New Issue
Block a user