Schema for the rl-cve report format
The Spectra Assure platform supports a special format for analysis reports called rl-cve
.
This format provides detailed information on all known vulnerabilities found in your software during analysis, and is particularly suitable for prioritizing the order of their resolution.
It can be downloaded from the Vulnerabilities page in the Portal UI.
To generate reports in the rl-cve
format:
- with
rl-secure
CLI, use the rl-secure report command - with the Spectra Assure Portal APIs, use the "Export analysis report" endpoint
This page describes the full schema of the rl-cve
report format.
How to read the schema?โ
The schema contents are displayed as a schema model and described in the order as they appear in the report.
The full rl-cve
report example is displayed below the schema.
Desktop browsers: To make the schema easier to read, you can hide the navigation sidebar by selecting the <<
button at the bottom left of the page.
rl-cve report schemaโ
rl-cve report exampleโ
| id | cvss-ver | cvss-score | marketing-name | file-path | file-sha256 | type | cpe | purl | product-name | product-ver | introduced-ver | introduced-at | resolved-ver | resolved-at | exploit-exists | exploit-malware | patch-mandate | fixable | triaged |
|-------------------|----------|------------|----------------|--------------------------------------------------------------------------------------|------------------------------------------------------------------|------------|------------------------------------------------------|------------------------------------------------------|-------------------|-------------|----------------|--------------------------|--------------|--------------------------|----------------|-----------------|---------------|---------|----------------|
| CVE-2016-2335 | 3 | 8.8 | | %ProgramFiles32%/7-Zip/7z.dll | 7f47382791a5264eed7310706e105c1cfa0e727359102f14933d4927bd296640 | component | cpe:2.3:a:7-zip:7-zip:15.05:beta:*:*:*:*:*:* | | 7z DLL | 15.14 | 4.59 beta | 2024-02-20T14:21:43+0000 | 16 | 2024-02-20T14:21:43+0000 | TRUE | FALSE | FALSE | TRUE | FALSE |
| CVE-2021-44228 | 3 | 10 | Log4Shell | unpacked_files/0/solr-8.10.0/server/lib/ext/log4j-core-2.14.1.jar | ade7402a70667a727635d5c4c29495f4ff96f061f12539763f6f123973b465b0 | component | cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:* | pkg:maven/org.apache.logging.log4j/log4j-core@2.14.1 | Apache Log4j Core | 2.14.1 | 2.0-beta9 | 2024-02-20T14:21:43+0000 | 2.15.0 | 2024-02-20T14:21:43+0000 | TRUE | TRUE | TRUE | TRUE | FALSE |
| CVE-2018-14721 | 3 | 10 | | unpacked_files/0/solr-8.10.0/server/solr-webapp/webapp/WEB-INF/lib/spatial4j-0.7.jar | 9adccb1d87f7e0be70567b952c65552607e2dcbde32a1579a8a639bdcfa1a3c8 | dependency | cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* | pkg:maven/org.locationtech.spatial4j/spatial4j@0.7 | Spatial4J | 0.7 | 2.7.0-rc1 | 2024-02-20T14:21:43+0000 | 2.9.7 | 2024-02-20T14:21:43+0000 | FALSE | FALSE | FALSE | TRUE | FALSE |