Skip to content

Instantly share code, notes, and snippets.

@AmitGupta7580
Created April 18, 2021 05:43
Show Gist options
  • Save AmitGupta7580/6bb1a91ccf405461fb6c84e991cd3b17 to your computer and use it in GitHub Desktop.
Save AmitGupta7580/6bb1a91ccf405461fb6c84e991cd3b17 to your computer and use it in GitHub Desktop.
Testing GraphQL API on vulnerablecode
from graphene import relay, Schema, ObjectType, List, Field, String
from graphene_django import DjangoObjectType
from graphene_django.filter import DjangoFilterConnectionField
from rest_framework import serializers
from vulnerabilities.api import MinimalPackageSerializer
from vulnerabilities.api import VulnerabilityReferenceSerializer
from vulnerabilities.api import VulnerabilitySerializer
from vulnerabilities.api import VulnerabilitySeveritySerializer
from vulnerabilities.api import MinimalVulnerabilitySerializer
from vulnerabilities.api import MinimalPackageSerializer
from vulnerabilities.models import Package
from vulnerabilities.models import Vulnerability
from vulnerabilities.models import VulnerabilityReference
from vulnerabilities.models import VulnerabilitySeverity
from packageurl import PackageURL
from rest_framework.response import Response
class VulnerabilitySeverityType(DjangoObjectType):
class Meta:
model = VulnerabilitySeverity
fields = "__all__"
class VulnerabilityReferenceType(DjangoObjectType):
class Meta:
model = VulnerabilityReference
fields = "__all__"
class MinimalVulnerabilityType(DjangoObjectType):
class Meta:
model = Vulnerability
fields = "__all__"
def resolve_id(self, info):
return "http://127.0.0.1:8000/api/vulnerabilities/{}".format(self.id)
class PackageUrlType(DjangoObjectType):
class Meta:
model = Package
exclude = ['vulnerabilities']
unresolved_vulnerabilities = List(MinimalVulnerabilityType)
resolved_vulnerabilities = List(MinimalVulnerabilityType)
def resolve_unresolved_vulnerabilities(self, info):
return self.vulnerabilities.filter(packagerelatedvulnerability__is_vulnerable=True)
def resolve_resolved_vulnerabilities(self, info):
return self.vulnerabilities.filter(packagerelatedvulnerability__is_vulnerable=False)
def resolve_id(self, info):
return "http://127.0.0.1:8000/api/packages/{}".format(self.id)
class Query(ObjectType):
packages_url = Field(lambda: List(PackageUrlType), purls=List(String))
def resolve_packages_url(root, info, purls):
queryset = Package.objects.none()
for purl in purls:
try:
purl = PackageURL.from_string(purl).to_dict()
data = Package.objects.filter(
**{key: value for key, value in purl.items() if value}
)
except ValueError as ve:
data = Package.objects.none()
queryset = queryset | data
return queryset
schema = Schema(query=Query)
{
packagesUrl(purls: ["pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]"]) {
id
name
version
type
namespace
subpath
qualifiers
unresolvedVulnerabilities {
id
vulnerabilityId
vulnerabilityreferenceSet {
url
source
referenceId
vulnerabilityseveritySet {
value
scoringSystem
}
}
}
resolvedVulnerabilities {
id
vulnerabilityId
vulnerabilityreferenceSet {
url
source
referenceId
vulnerabilityseveritySet {
value
scoringSystem
}
}
}
}
}
{
"data": {
"packagesUrl": [
{
"id": "http://127.0.0.1:8000/api/packages/11",
"name": "scratchpad",
"version": "1.0.0-beta.1",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/1",
"vulnerabilityId": "CVE-2021-28031",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/okready/scratchpad/issues/1",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html",
"source": "",
"referenceId": "RUSTSEC-2021-0030",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/12",
"name": "scratchpad",
"version": "1.3.1",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/1",
"vulnerabilityId": "CVE-2021-28031",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/okready/scratchpad/issues/1",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html",
"source": "",
"referenceId": "RUSTSEC-2021-0030",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/33",
"name": "linked-hash-map",
"version": "0.0.1",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/2",
"vulnerabilityId": "CVE-2020-25573",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/contain-rs/linked-hash-map/pull/100",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html",
"source": "",
"referenceId": "RUSTSEC-2020-0026",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/34",
"name": "linked-hash-map",
"version": "0.5.4",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/2",
"vulnerabilityId": "CVE-2020-25573",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/contain-rs/linked-hash-map/pull/100",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html",
"source": "",
"referenceId": "RUSTSEC-2020-0026",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/35",
"name": "linked-hash-map",
"version": "0.5.3",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/2",
"vulnerabilityId": "CVE-2020-25573",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/contain-rs/linked-hash-map/pull/100",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html",
"source": "",
"referenceId": "RUSTSEC-2020-0026",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/36",
"name": "bitvec",
"version": "0.17.1",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/51",
"name": "bitvec",
"version": "0.13.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/52",
"name": "bitvec",
"version": "0.15.1",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/53",
"name": "bitvec",
"version": "0.18.5",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/54",
"name": "bitvec",
"version": "0.19.4",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/55",
"name": "bitvec",
"version": "0.19.5",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/80",
"name": "bitvec",
"version": "0.8.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/81",
"name": "bitvec",
"version": "0.19.3",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/82",
"name": "bitvec",
"version": "0.5.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/83",
"name": "bitvec",
"version": "0.17.4",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/84",
"name": "bitvec",
"version": "0.19.2",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/85",
"name": "bitvec",
"version": "0.6.0-e2018",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/86",
"name": "bitvec",
"version": "0.18.1",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [],
"resolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerabilityId": "CVE-2020-35862",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"source": "",
"referenceId": "RUSTSEC-2020-0007",
"vulnerabilityseveritySet": []
}
]
}
]
},
{
"id": "http://127.0.0.1:8000/api/packages/87",
"name": "marc",
"version": "0.2.6",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/88",
"name": "marc",
"version": "0.2.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/89",
"name": "marc",
"version": "1.1.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/90",
"name": "marc",
"version": "1.2.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/91",
"name": "marc",
"version": "0.2.3",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/92",
"name": "marc",
"version": "1.0.0",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
},
{
"id": "http://127.0.0.1:8000/api/packages/93",
"name": "marc",
"version": "0.2.2",
"type": "cargo",
"namespace": "",
"subpath": "",
"qualifiers": "{}",
"unresolvedVulnerabilities": [
{
"id": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerabilityId": "CVE-2021-26308",
"vulnerabilityreferenceSet": [
{
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"source": "",
"referenceId": "",
"vulnerabilityseveritySet": []
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"source": "",
"referenceId": "RUSTSEC-2021-0014",
"vulnerabilityseveritySet": []
}
]
}
],
"resolvedVulnerabilities": []
}
]
}
}
{
"purls": [
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]",
"pkg:cargo/[email protected]"
]
}
[
{
"url": "http://127.0.0.1:8000/api/packages/11",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/1",
"vulnerability_id": "CVE-2021-28031",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/okready/scratchpad/issues/1",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0030",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "scratchpad",
"version": "1.0.0-beta.1",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/12",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/1",
"vulnerability_id": "CVE-2021-28031",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/okready/scratchpad/issues/1",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0030",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "scratchpad",
"version": "1.3.1",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/33",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/2",
"vulnerability_id": "CVE-2020-25573",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/contain-rs/linked-hash-map/pull/100",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0026",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "linked-hash-map",
"version": "0.0.1",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/34",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/2",
"vulnerability_id": "CVE-2020-25573",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/contain-rs/linked-hash-map/pull/100",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0026",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "linked-hash-map",
"version": "0.5.4",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/35",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/2",
"vulnerability_id": "CVE-2020-25573",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/contain-rs/linked-hash-map/pull/100",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0026",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "linked-hash-map",
"version": "0.5.3",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/36",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.17.1",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/51",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.13.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/52",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.15.1",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/53",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.18.5",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/54",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.19.4",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/55",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.19.5",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/80",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.8.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/81",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.19.3",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/82",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.5.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/83",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.17.4",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/84",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.19.2",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/85",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.6.0-e2018",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/86",
"unresolved_vulnerabilities": [],
"resolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/3",
"vulnerability_id": "CVE-2020-35862",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/myrrlyn/bitvec/issues/55",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2020-0007",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html",
"scores": []
}
]
}
],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "bitvec",
"version": "0.18.1",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/87",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "0.2.6",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/88",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "0.2.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/89",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "1.1.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/90",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "1.2.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/91",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "0.2.3",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/92",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "1.0.0",
"subpath": "",
"qualifiers": {}
},
{
"url": "http://127.0.0.1:8000/api/packages/93",
"unresolved_vulnerabilities": [
{
"url": "http://127.0.0.1:8000/api/vulnerabilities/4",
"vulnerability_id": "CVE-2021-26308",
"references": [
{
"source": "",
"reference_id": "",
"url": "https://github.com/blackbeam/rust-marc/issues/7",
"scores": []
},
{
"source": "",
"reference_id": "RUSTSEC-2021-0014",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html",
"scores": []
}
]
}
],
"resolved_vulnerabilities": [],
"purl": "pkg:cargo/[email protected]",
"type": "cargo",
"namespace": "",
"name": "marc",
"version": "0.2.2",
"subpath": "",
"qualifiers": {}
}
]
INSTALLED_APPS = [
...
"graphene_django",
]
from graphene_django.views import GraphQLView
from vulnerabilities.graphQL_api import schema
urlpatterns = [
...,
path(r"graphql", GraphQLView.as_view(graphiql=True, schema=schema)),
]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment