mirror of
https://github.com/ysoftdevs/DependencyCheck.git
synced 2026-04-21 07:51:56 +02:00
updated report template
This commit is contained in:
@@ -1,6 +1,5 @@
|
||||
{
|
||||
"reportSchema": "1.0",
|
||||
"analysis": {
|
||||
"scanInfo": {
|
||||
"engineVersion": "$version",
|
||||
"dataSource": [
|
||||
@@ -110,8 +109,7 @@
|
||||
]
|
||||
#if($dependency.getVulnerabilities().size()>0 || $dependency.getSuppressedVulnerabilities().size()>0)
|
||||
,"vulnerabilities": [
|
||||
#foreach($vuln in $dependency.getVulnerabilities())
|
||||
#if($foreach.count > 1),#end {
|
||||
#foreach($vuln in $dependency.getVulnerabilities())#if($foreach.count > 1),#end {
|
||||
"name": "$enc.json($vuln.name)",
|
||||
"cvssScore": "$vuln.cvssScore",
|
||||
"cvssAccessVector": "$enc.json($vuln.cvssAccessVector)",
|
||||
@@ -120,36 +118,29 @@
|
||||
"cvssConfidentialImpact": "$enc.json($vuln.cvssConfidentialityImpact)",
|
||||
"cvssIntegrityImpact": "$enc.json($vuln.cvssIntegrityImpact)",
|
||||
"cvssAvailabilityImpact": "$enc.json($vuln.cvssAvailabilityImpact)",
|
||||
#if ($vuln.cvssScore<4.0)
|
||||
"severity": "Low",
|
||||
#elseif ($vuln.cvssScore>=7.0)
|
||||
"severity": "High",
|
||||
#else
|
||||
"severity": "Medium",
|
||||
#end
|
||||
#if($vuln.cwe)"cwe": "$enc.json($vuln.cwe)",#end
|
||||
#if ($vuln.cvssScore<4.0)"severity": "Low",
|
||||
#elseif ($vuln.cvssScore>=7.0)"severity": "High",
|
||||
#else "severity": "Medium",#end
|
||||
"cwe": "#if ($vuln.cwe)$enc.json($vuln.cwe)#end",
|
||||
"description": "$enc.json($vuln.description)",
|
||||
#if ($vuln.notes)"notes": "$enc.json($vuln.notes)"#end
|
||||
"notes": "#if ($vuln.notes)$enc.json($vuln.notes)#end",
|
||||
"references": [
|
||||
#foreach($ref in $vuln.getReferences())
|
||||
#if($foreach.count > 1),#end {
|
||||
"source": "$enc.json($ref.source)",
|
||||
"url": "$enc.json($ref.url)",
|
||||
"name": "$enc.json($ref.name)"
|
||||
}
|
||||
#end
|
||||
}#end
|
||||
],
|
||||
"vulnerableSoftware": [
|
||||
#foreach($vs in $vuln.getVulnerableSoftware())
|
||||
#if($foreach.count > 1),#end {
|
||||
#if($vs.hasPreviousVersion()) "allPreviousVersion": "true",#end
|
||||
"software": "$enc.json($vs.name)"
|
||||
}
|
||||
#end
|
||||
]
|
||||
#if($vs.hasPreviousVersion()) ,"allPreviousVersion": "true"#end
|
||||
}#end
|
||||
]
|
||||
#end
|
||||
}#end
|
||||
]#end
|
||||
|
||||
#if($dependency.getSuppressedVulnerabilities().size()>0 || $dependency.getSuppressedVulnerabilities().size()>0)
|
||||
,"suppressedVulnerabilities": [
|
||||
@@ -166,33 +157,26 @@
|
||||
#elseif ($vuln.cvssScore>=7.0) "severity": "High",
|
||||
#else "severity": "Medium",
|
||||
#end
|
||||
#if ($vuln.cwe)"cwe": "$enc.json($vuln.cwe)",#end
|
||||
"description": "$enc.json($vuln.description)"
|
||||
#if ($vuln.notes),"notes": "$enc.json($vuln.notes)"#end
|
||||
,"references": [
|
||||
"cwe": "#if ($vuln.cwe)$enc.json($vuln.cwe)#end",
|
||||
"description": "$enc.json($vuln.description)",
|
||||
"notes": "#if ($vuln.notes)$enc.json($vuln.notes)#end",
|
||||
"references": [
|
||||
#foreach($ref in $vuln.getReferences())
|
||||
#if($foreach.count > 1),#end {
|
||||
"source": "$enc.json($ref.source)",
|
||||
"url": "$enc.json($ref.url)",
|
||||
"name": "$enc.json($ref.name)"
|
||||
}
|
||||
#end
|
||||
}#end
|
||||
],
|
||||
"vulnerableSoftware": [
|
||||
#foreach($vs in $vuln.getVulnerableSoftware())
|
||||
#if($foreach.count > 1),#end {
|
||||
#if($vs.hasPreviousVersion()) "allPreviousVersion": "true",#end
|
||||
"name": "$enc.json($vs.name)"
|
||||
}
|
||||
#end
|
||||
#if($vs.hasPreviousVersion()) ,"allPreviousVersion": "true"#end
|
||||
}#end
|
||||
]
|
||||
}
|
||||
#end
|
||||
}#end
|
||||
]#end
|
||||
}#end
|
||||
]
|
||||
#end
|
||||
|
||||
}
|
||||
#end
|
||||
]
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user