You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-6
Original file line number
Diff line number
Diff line change
@@ -790,10 +790,7 @@ This command will extract basic vulnerability report data from an SBOM that has
790
790
791
791
#### Where flag filtering
792
792
793
-
In addition a `where` filter flag can be supplied to only include results where values match supplied regex. Supported keys for the `where` filter include the following column names in the report (i.e., `id`, `bom-ref`, `created`
794
-
`published`, `updated`, `rejected` and `description`).
795
-
796
-
**Note**: filtering using `source.name` and `source.url` are coming soon
793
+
In addition a `where` filter flag can be supplied to only include results where values match supplied regex. Supported keys for the `where` filter include the following column names in the report (i.e., `id`, `bom-ref`, `source-name`, `source-url`, `created`, `published`, `updated`, `rejected` and `description`).
797
794
798
795
#### Format flag
799
796
@@ -814,7 +811,7 @@ Currently, all `vulnerability list` command results are sorted by vulnerability
814
811
```
815
812
816
813
```bash
817
-
id bom-ref source.url source.name created published updated rejected description
814
+
id bom-ref source-name source-url created published updated rejected description
CVE-2020-25649 NVD https://nvd.nist.gov/vuln/detail/CVE-2020-25649 2020-12-03T00:00:00.000Z 2020-12-03T00:00:00.000Z 2023-02-02T00:00:00.000Z com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection.
820
817
CVE-2022-42003 NVD https://nvd.nist.gov/vuln/detail/CVE-2022-42003 2022-10-02T00:00:00.000Z 2022-10-02T00:00:00.000Z 2022-10-02T00:00:00.000Z In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CVE-2020-25649 NVD https://nvd.nist.gov/vuln/detail/CVE-2020-25649 2020-12-03T00:00:00.000Z 2020-12-03T00:00:00.000Z 2023-02-02T00:00:00.000Z com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection.
Copy file name to clipboardExpand all lines: docs/demo.md
+3-6
Original file line number
Diff line number
Diff line change
@@ -624,10 +624,7 @@ This command will extract basic vulnerability report data from an SBOM that has
624
624
625
625
#### Where flag filtering
626
626
627
-
In addition a `where` filter flag can be supplied to only include results where values match supplied regex. Supported keys for the `where` filter include the following column names in the report (i.e., `id`, `bom-ref`, `created`
628
-
`published`, `updated`, `rejected` and `description`).
629
-
630
-
**Note**: filtering using `source.name` and `source.url` are coming soon
627
+
In addition a `where` filter flag can be supplied to only include results where values match supplied regex. Supported keys for the `where` filter include the following column names in the report (i.e., `id`, `bom-ref`, `source-name`, `source-url`, `created`, `published`, `updated`, `rejected` and `description`).
631
628
632
629
#### Format flag
633
630
@@ -648,7 +645,7 @@ Currently, all `vulnerability list` command results are sorted by vulnerability
648
645
```
649
646
650
647
```bash
651
-
id bom-ref source.url source.name created published updated rejected description
648
+
id bom-ref source-name source-url created published updated rejected description
CVE-2020-25649 NVD https://nvd.nist.gov/vuln/detail/CVE-2020-25649 2020-12-03T00:00:00.000Z 2020-12-03T00:00:00.000Z 2023-02-02T00:00:00.000Z com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection.
654
651
CVE-2022-42003 NVD https://nvd.nist.gov/vuln/detail/CVE-2022-42003 2022-10-02T00:00:00.000Z 2022-10-02T00:00:00.000Z 2022-10-02T00:00:00.000Z In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CVE-2020-25649 NVD https://nvd.nist.gov/vuln/detail/CVE-2020-25649 2020-12-03T00:00:00.000Z 2020-12-03T00:00:00.000Z 2023-02-02T00:00:00.000Z com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection.
0 commit comments