-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Anchore Enterprise Vuln parser #11552
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Comments
Is this sample file inclusive of all parameters that can be present in the output? |
@pUrGe12 Yes it is. It includes all outputs |
Does this match with what you were expecting? @Sopuru |
10 tasks
manuel-sommer
added a commit
to manuel-sommer/django-DefectDojo
that referenced
this issue
Mar 15, 2025
mtesauro
pushed a commit
that referenced
this issue
Mar 20, 2025
This can be closed @mtesauro |
iago-r
pushed a commit
to iago-r/django-DefectDojo
that referenced
this issue
Mar 27, 2025
β¦ (DefectDojo#12020) * π fix parser anchore engine new report format DefectDojo#11552 * first shot * fixes * advance unittests
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Anchore Enterprise Vulnerability
While working on integrating Anchore vulnerability data with DefectDojo, I encountered some issues with the current Anchore Engine Parser. It appears that the parser expects an outdated data structure that no longer aligns with the data provided by Anchore Enterprise and Anchore Engine itself is outdated and replaced by Anchore Enterprise. There is a need for the Anchore Enterprise vulnerability data parser in DefectDojo.
https://anchore.com/
Sample File
Sample vuln report attached.
Vulnerability_Report_2025-01-13T10_09_59.971Z.json
The text was updated successfully, but these errors were encountered: