|
1 | 1 | { |
2 | | - "version": "2.1.0", |
3 | 2 | "$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json", |
4 | 3 | "runs": [ |
5 | 4 | { |
6 | | - "tool": { |
7 | | - "driver": { |
8 | | - "fullName": "Trivy Vulnerability Scanner", |
9 | | - "informationUri": "https://github.com/aquasecurity/trivy", |
10 | | - "name": "Trivy", |
11 | | - "rules": null, |
12 | | - "version": "0.59.1" |
| 5 | + "columnKind": "utf16CodeUnits", |
| 6 | + "originalUriBaseIds": { |
| 7 | + "ROOTPATH": { |
| 8 | + "uri": "file:///plugins/tools/trivy/test/src/" |
13 | 9 | } |
14 | 10 | }, |
15 | 11 | "results": [ |
16 | 12 | { |
17 | | - "ruleId": "CVE-2024-21538", |
18 | | - "ruleIndex": 0, |
19 | 13 | "level": "error", |
| 14 | + "locations": [ |
| 15 | + { |
| 16 | + "message": { |
| 17 | + "text": "package-lock.json: cross-spawn@7.0.3" |
| 18 | + }, |
| 19 | + "physicalLocation": { |
| 20 | + "artifactLocation": { |
| 21 | + "uri": "package-lock.json", |
| 22 | + "uriBaseId": "ROOTPATH" |
| 23 | + }, |
| 24 | + "region": { |
| 25 | + "endColumn": 1, |
| 26 | + "endLine": 527, |
| 27 | + "startColumn": 1, |
| 28 | + "startLine": 515 |
| 29 | + } |
| 30 | + } |
| 31 | + } |
| 32 | + ], |
20 | 33 | "message": { |
21 | 34 | "text": "Package: cross-spawn\nInstalled Version: 7.0.3\nVulnerability CVE-2024-21538\nSeverity: HIGH\nFixed Version: 7.0.5, 6.0.6\nLink: [CVE-2024-21538](https://avd.aquasec.com/nvd/cve-2024-21538)" |
22 | 35 | }, |
| 36 | + "ruleId": "CVE-2024-21538", |
| 37 | + "ruleIndex": 1 |
| 38 | + }, |
| 39 | + { |
| 40 | + "level": "note", |
23 | 41 | "locations": [ |
24 | 42 | { |
| 43 | + "message": { |
| 44 | + "text": "package-lock.json: brace-expansion@1.1.11" |
| 45 | + }, |
25 | 46 | "physicalLocation": { |
26 | 47 | "artifactLocation": { |
27 | 48 | "uri": "package-lock.json", |
28 | 49 | "uriBaseId": "ROOTPATH" |
29 | 50 | }, |
30 | 51 | "region": { |
31 | | - "startLine": 515, |
| 52 | + "endColumn": 1, |
| 53 | + "endLine": 357, |
32 | 54 | "startColumn": 1, |
33 | | - "endLine": 527, |
34 | | - "endColumn": 1 |
| 55 | + "startLine": 349 |
35 | 56 | } |
36 | | - }, |
37 | | - "message": { |
38 | | - "text": "package-lock.json: cross-spawn@7.0.3" |
39 | 57 | } |
40 | 58 | } |
41 | | - ] |
| 59 | + ], |
| 60 | + "message": { |
| 61 | + "text": "Package: brace-expansion\nInstalled Version: 1.1.11\nVulnerability CVE-2025-5889\nSeverity: LOW\nFixed Version: 2.0.2, 1.1.12, 3.0.1, 4.0.1\nLink: [CVE-2025-5889](https://avd.aquasec.com/nvd/cve-2025-5889)" |
| 62 | + }, |
| 63 | + "ruleId": "CVE-2025-5889", |
| 64 | + "ruleIndex": 0 |
42 | 65 | } |
43 | 66 | ], |
44 | | - "columnKind": "utf16CodeUnits", |
45 | | - "originalUriBaseIds": { |
46 | | - "ROOTPATH": { |
47 | | - "uri": "file:///plugins/tools/trivy/test/src/" |
| 67 | + "tool": { |
| 68 | + "driver": { |
| 69 | + "fullName": "Trivy Vulnerability Scanner", |
| 70 | + "informationUri": "https://github.com/aquasecurity/trivy", |
| 71 | + "name": "Trivy", |
| 72 | + "rules": null, |
| 73 | + "version": "0.59.1" |
48 | 74 | } |
49 | 75 | } |
50 | 76 | } |
51 | | - ] |
| 77 | + ], |
| 78 | + "version": "2.1.0" |
52 | 79 | } |
0 commit comments