@@ -1053,43 +1053,43 @@ def saml2_attrib_map_format(dict):
1053
1053
# Including the severity in the hash_code keeps those findings not duplicate
1054
1054
'Anchore Engine Scan' : ['title' , 'severity' , 'component_name' , 'component_version' , 'file_path' ],
1055
1055
'Anchore Grype' : ['title' , 'severity' , 'component_name' , 'component_version' ],
1056
- 'Aqua Scan' : ['severity' , 'cve ' , 'component_name' , 'component_version' ],
1056
+ 'Aqua Scan' : ['severity' , 'vulnerability_ids ' , 'component_name' , 'component_version' ],
1057
1057
'Bandit Scan' : ['file_path' , 'line' , 'vuln_id_from_tool' ],
1058
- 'CargoAudit Scan' : ['cve ' , 'severity' , 'component_name' , 'component_version' , 'vuln_id_from_tool' ],
1058
+ 'CargoAudit Scan' : ['vulnerability_ids ' , 'severity' , 'component_name' , 'component_version' , 'vuln_id_from_tool' ],
1059
1059
'Checkmarx Scan' : ['cwe' , 'severity' , 'file_path' ],
1060
- 'Checkmarx OSA' : ['cve ' , 'component_name' ],
1060
+ 'Checkmarx OSA' : ['vulnerability_ids ' , 'component_name' ],
1061
1061
'Cloudsploit Scan' : ['title' , 'description' ],
1062
1062
'SonarQube Scan' : ['cwe' , 'severity' , 'file_path' ],
1063
1063
'SonarQube API Import' : ['title' , 'file_path' , 'line' ],
1064
- 'Dependency Check Scan' : ['cve ' , 'cwe' , 'file_path' ],
1064
+ 'Dependency Check Scan' : ['vulnerability_ids ' , 'cwe' , 'file_path' ],
1065
1065
'Dockle Scan' : ['title' , 'description' , 'vuln_id_from_tool' ],
1066
- 'Dependency Track Finding Packaging Format (FPF) Export' : ['component_name' , 'component_version' , 'cwe' , 'cve ' ],
1066
+ 'Dependency Track Finding Packaging Format (FPF) Export' : ['component_name' , 'component_version' , 'cwe' , 'vulnerability_ids ' ],
1067
1067
'Mobsfscan Scan' : ['title' , 'severity' , 'cwe' ],
1068
- 'Nessus Scan' : ['title' , 'severity' , 'cve ' , 'cwe' ],
1069
- 'Nexpose Scan' : ['title' , 'severity' , 'cve ' , 'cwe' ],
1068
+ 'Nessus Scan' : ['title' , 'severity' , 'vulnerability_ids ' , 'cwe' ],
1069
+ 'Nexpose Scan' : ['title' , 'severity' , 'vulnerability_ids ' , 'cwe' ],
1070
1070
# possible improvement: in the scanner put the library name into file_path, then dedup on cwe + file_path + severity
1071
- 'NPM Audit Scan' : ['title' , 'severity' , 'file_path' , 'cve ' , 'cwe' ],
1071
+ 'NPM Audit Scan' : ['title' , 'severity' , 'file_path' , 'vulnerability_ids ' , 'cwe' ],
1072
1072
# possible improvement: in the scanner put the library name into file_path, then dedup on cwe + file_path + severity
1073
- 'Yarn Audit Scan' : ['title' , 'severity' , 'file_path' , 'cve ' , 'cwe' ],
1074
- # possible improvement: in the scanner put the library name into file_path, then dedup on cve + file_path + severity
1073
+ 'Yarn Audit Scan' : ['title' , 'severity' , 'file_path' , 'vulnerability_ids ' , 'cwe' ],
1074
+ # possible improvement: in the scanner put the library name into file_path, then dedup on vulnerability_ids + file_path + severity
1075
1075
'Whitesource Scan' : ['title' , 'severity' , 'description' ],
1076
1076
'ZAP Scan' : ['title' , 'cwe' , 'severity' ],
1077
1077
'Qualys Scan' : ['title' , 'severity' ],
1078
1078
# 'Qualys Webapp Scan': ['title', 'unique_id_from_tool'],
1079
- 'PHP Symfony Security Check' : ['title' , 'cve ' ],
1080
- 'Clair Scan' : ['title' , 'cve ' , 'description' , 'severity' ],
1079
+ 'PHP Symfony Security Check' : ['title' , 'vulnerability_ids ' ],
1080
+ 'Clair Scan' : ['title' , 'vulnerability_ids ' , 'description' , 'severity' ],
1081
1081
'Clair Klar Scan' : ['title' , 'description' , 'severity' ],
1082
1082
# for backwards compatibility because someone decided to rename this scanner:
1083
- 'Symfony Security Check' : ['title' , 'cve ' ],
1084
- 'DSOP Scan' : ['cve ' ],
1083
+ 'Symfony Security Check' : ['title' , 'vulnerability_ids ' ],
1084
+ 'DSOP Scan' : ['vulnerability_ids ' ],
1085
1085
'Acunetix Scan' : ['title' , 'description' ],
1086
1086
'Terrascan Scan' : ['vuln_id_from_tool' , 'title' , 'severity' , 'file_path' , 'line' , 'component_name' ],
1087
- 'Trivy Scan' : ['title' , 'severity' , 'cve ' , 'cwe' ],
1087
+ 'Trivy Scan' : ['title' , 'severity' , 'vulnerability_ids ' , 'cwe' ],
1088
1088
'TFSec Scan' : ['severity' , 'vuln_id_from_tool' , 'file_path' , 'line' ],
1089
1089
'Snyk Scan' : ['vuln_id_from_tool' , 'file_path' , 'component_name' , 'component_version' ],
1090
- 'GitLab Dependency Scanning Report' : ['title' , 'cve ' , 'file_path' , 'component_name' , 'component_version' ],
1090
+ 'GitLab Dependency Scanning Report' : ['title' , 'vulnerability_ids ' , 'file_path' , 'component_name' , 'component_version' ],
1091
1091
'SpotBugs Scan' : ['cwe' , 'severity' , 'file_path' , 'line' ],
1092
- 'JFrog Xray Unified Scan' : ['cve ' , 'file_path' , 'component_name' , 'component_version' ],
1092
+ 'JFrog Xray Unified Scan' : ['vulnerability_ids ' , 'file_path' , 'component_name' , 'component_version' ],
1093
1093
'Scout Suite Scan' : ['file_path' , 'vuln_id_from_tool' ], # for now we use file_path as there is no attribute for "service"
1094
1094
'AWS Security Hub Scan' : ['unique_id_from_tool' ],
1095
1095
'Meterian Scan' : ['cwe' , 'component_name' , 'component_version' , 'description' , 'severity' ],
@@ -1145,7 +1145,7 @@ def saml2_attrib_map_format(dict):
1145
1145
# List of fields that are known to be usable in hash_code computation)
1146
1146
# 'endpoints' is a pseudo field that uses the endpoints (for dynamic scanners)
1147
1147
# 'unique_id_from_tool' is often not needed here as it can be used directly in the dedupe algorithm, but it's also possible to use it for hashing
1148
- HASHCODE_ALLOWED_FIELDS = ['title' , 'cwe' , 'cve ' , 'line' , 'file_path' , 'component_name' , 'component_version' , 'description' , 'endpoints' , 'unique_id_from_tool' , 'severity' , 'vuln_id_from_tool' ]
1148
+ HASHCODE_ALLOWED_FIELDS = ['title' , 'cwe' , 'vulnerability_ids ' , 'line' , 'file_path' , 'component_name' , 'component_version' , 'description' , 'endpoints' , 'unique_id_from_tool' , 'severity' , 'vuln_id_from_tool' ]
1149
1149
1150
1150
# Adding fields to the hash_code calculation regardless of the previous settings
1151
1151
HASH_CODE_FIELDS_ALWAYS = ['service' ]
@@ -1442,4 +1442,5 @@ def saml2_attrib_map_format(dict):
1442
1442
'OSV' : 'https://osv.dev/vulnerability/' ,
1443
1443
'PYSEC' : 'https://osv.dev/vulnerability/' ,
1444
1444
'SNYK' : 'https://snyk.io/vuln/' ,
1445
+ 'RUSTSEC' : 'https://rustsec.org/advisories/' ,
1445
1446
}
0 commit comments