Created
April 18, 2021 05:43
-
-
Save AmitGupta7580/6bb1a91ccf405461fb6c84e991cd3b17 to your computer and use it in GitHub Desktop.
Testing GraphQL API on vulnerablecode
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from graphene import relay, Schema, ObjectType, List, Field, String | |
from graphene_django import DjangoObjectType | |
from graphene_django.filter import DjangoFilterConnectionField | |
from rest_framework import serializers | |
from vulnerabilities.api import MinimalPackageSerializer | |
from vulnerabilities.api import VulnerabilityReferenceSerializer | |
from vulnerabilities.api import VulnerabilitySerializer | |
from vulnerabilities.api import VulnerabilitySeveritySerializer | |
from vulnerabilities.api import MinimalVulnerabilitySerializer | |
from vulnerabilities.api import MinimalPackageSerializer | |
from vulnerabilities.models import Package | |
from vulnerabilities.models import Vulnerability | |
from vulnerabilities.models import VulnerabilityReference | |
from vulnerabilities.models import VulnerabilitySeverity | |
from packageurl import PackageURL | |
from rest_framework.response import Response | |
class VulnerabilitySeverityType(DjangoObjectType): | |
class Meta: | |
model = VulnerabilitySeverity | |
fields = "__all__" | |
class VulnerabilityReferenceType(DjangoObjectType): | |
class Meta: | |
model = VulnerabilityReference | |
fields = "__all__" | |
class MinimalVulnerabilityType(DjangoObjectType): | |
class Meta: | |
model = Vulnerability | |
fields = "__all__" | |
def resolve_id(self, info): | |
return "http://127.0.0.1:8000/api/vulnerabilities/{}".format(self.id) | |
class PackageUrlType(DjangoObjectType): | |
class Meta: | |
model = Package | |
exclude = ['vulnerabilities'] | |
unresolved_vulnerabilities = List(MinimalVulnerabilityType) | |
resolved_vulnerabilities = List(MinimalVulnerabilityType) | |
def resolve_unresolved_vulnerabilities(self, info): | |
return self.vulnerabilities.filter(packagerelatedvulnerability__is_vulnerable=True) | |
def resolve_resolved_vulnerabilities(self, info): | |
return self.vulnerabilities.filter(packagerelatedvulnerability__is_vulnerable=False) | |
def resolve_id(self, info): | |
return "http://127.0.0.1:8000/api/packages/{}".format(self.id) | |
class Query(ObjectType): | |
packages_url = Field(lambda: List(PackageUrlType), purls=List(String)) | |
def resolve_packages_url(root, info, purls): | |
queryset = Package.objects.none() | |
for purl in purls: | |
try: | |
purl = PackageURL.from_string(purl).to_dict() | |
data = Package.objects.filter( | |
**{key: value for key, value in purl.items() if value} | |
) | |
except ValueError as ve: | |
data = Package.objects.none() | |
queryset = queryset | data | |
return queryset | |
schema = Schema(query=Query) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
packagesUrl(purls: ["pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]", "pkg:cargo/[email protected]"]) { | |
id | |
name | |
version | |
type | |
namespace | |
subpath | |
qualifiers | |
unresolvedVulnerabilities { | |
id | |
vulnerabilityId | |
vulnerabilityreferenceSet { | |
url | |
source | |
referenceId | |
vulnerabilityseveritySet { | |
value | |
scoringSystem | |
} | |
} | |
} | |
resolvedVulnerabilities { | |
id | |
vulnerabilityId | |
vulnerabilityreferenceSet { | |
url | |
source | |
referenceId | |
vulnerabilityseveritySet { | |
value | |
scoringSystem | |
} | |
} | |
} | |
} | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"data": { | |
"packagesUrl": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/11", | |
"name": "scratchpad", | |
"version": "1.0.0-beta.1", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/1", | |
"vulnerabilityId": "CVE-2021-28031", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/okready/scratchpad/issues/1", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0030", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/12", | |
"name": "scratchpad", | |
"version": "1.3.1", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/1", | |
"vulnerabilityId": "CVE-2021-28031", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/okready/scratchpad/issues/1", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0030", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/33", | |
"name": "linked-hash-map", | |
"version": "0.0.1", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/2", | |
"vulnerabilityId": "CVE-2020-25573", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/contain-rs/linked-hash-map/pull/100", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0026", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/34", | |
"name": "linked-hash-map", | |
"version": "0.5.4", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/2", | |
"vulnerabilityId": "CVE-2020-25573", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/contain-rs/linked-hash-map/pull/100", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0026", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/35", | |
"name": "linked-hash-map", | |
"version": "0.5.3", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/2", | |
"vulnerabilityId": "CVE-2020-25573", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/contain-rs/linked-hash-map/pull/100", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0026", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/36", | |
"name": "bitvec", | |
"version": "0.17.1", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/51", | |
"name": "bitvec", | |
"version": "0.13.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/52", | |
"name": "bitvec", | |
"version": "0.15.1", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/53", | |
"name": "bitvec", | |
"version": "0.18.5", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/54", | |
"name": "bitvec", | |
"version": "0.19.4", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/55", | |
"name": "bitvec", | |
"version": "0.19.5", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/80", | |
"name": "bitvec", | |
"version": "0.8.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/81", | |
"name": "bitvec", | |
"version": "0.19.3", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/82", | |
"name": "bitvec", | |
"version": "0.5.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/83", | |
"name": "bitvec", | |
"version": "0.17.4", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/84", | |
"name": "bitvec", | |
"version": "0.19.2", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/85", | |
"name": "bitvec", | |
"version": "0.6.0-e2018", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/86", | |
"name": "bitvec", | |
"version": "0.18.1", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [], | |
"resolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerabilityId": "CVE-2020-35862", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2020-0007", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/87", | |
"name": "marc", | |
"version": "0.2.6", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/88", | |
"name": "marc", | |
"version": "0.2.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/89", | |
"name": "marc", | |
"version": "1.1.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/90", | |
"name": "marc", | |
"version": "1.2.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/91", | |
"name": "marc", | |
"version": "0.2.3", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/92", | |
"name": "marc", | |
"version": "1.0.0", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
}, | |
{ | |
"id": "http://127.0.0.1:8000/api/packages/93", | |
"name": "marc", | |
"version": "0.2.2", | |
"type": "cargo", | |
"namespace": "", | |
"subpath": "", | |
"qualifiers": "{}", | |
"unresolvedVulnerabilities": [ | |
{ | |
"id": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerabilityId": "CVE-2021-26308", | |
"vulnerabilityreferenceSet": [ | |
{ | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"source": "", | |
"referenceId": "", | |
"vulnerabilityseveritySet": [] | |
}, | |
{ | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"source": "", | |
"referenceId": "RUSTSEC-2021-0014", | |
"vulnerabilityseveritySet": [] | |
} | |
] | |
} | |
], | |
"resolvedVulnerabilities": [] | |
} | |
] | |
} | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"purls": [ | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]", | |
"pkg:cargo/[email protected]" | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/11", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/1", | |
"vulnerability_id": "CVE-2021-28031", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/okready/scratchpad/issues/1", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0030", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "scratchpad", | |
"version": "1.0.0-beta.1", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/12", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/1", | |
"vulnerability_id": "CVE-2021-28031", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/okready/scratchpad/issues/1", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0030", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0030.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "scratchpad", | |
"version": "1.3.1", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/33", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/2", | |
"vulnerability_id": "CVE-2020-25573", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/contain-rs/linked-hash-map/pull/100", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0026", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "linked-hash-map", | |
"version": "0.0.1", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/34", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/2", | |
"vulnerability_id": "CVE-2020-25573", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/contain-rs/linked-hash-map/pull/100", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0026", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "linked-hash-map", | |
"version": "0.5.4", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/35", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/2", | |
"vulnerability_id": "CVE-2020-25573", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/contain-rs/linked-hash-map/pull/100", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0026", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0026.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "linked-hash-map", | |
"version": "0.5.3", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/36", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.17.1", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/51", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.13.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/52", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.15.1", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/53", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.18.5", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/54", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.19.4", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/55", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.19.5", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/80", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.8.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/81", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.19.3", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/82", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.5.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/83", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.17.4", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/84", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.19.2", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/85", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.6.0-e2018", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/86", | |
"unresolved_vulnerabilities": [], | |
"resolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/3", | |
"vulnerability_id": "CVE-2020-35862", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/myrrlyn/bitvec/issues/55", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2020-0007", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0007.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "bitvec", | |
"version": "0.18.1", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/87", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "0.2.6", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/88", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "0.2.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/89", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "1.1.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/90", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "1.2.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/91", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "0.2.3", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/92", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "1.0.0", | |
"subpath": "", | |
"qualifiers": {} | |
}, | |
{ | |
"url": "http://127.0.0.1:8000/api/packages/93", | |
"unresolved_vulnerabilities": [ | |
{ | |
"url": "http://127.0.0.1:8000/api/vulnerabilities/4", | |
"vulnerability_id": "CVE-2021-26308", | |
"references": [ | |
{ | |
"source": "", | |
"reference_id": "", | |
"url": "https://github.com/blackbeam/rust-marc/issues/7", | |
"scores": [] | |
}, | |
{ | |
"source": "", | |
"reference_id": "RUSTSEC-2021-0014", | |
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0014.html", | |
"scores": [] | |
} | |
] | |
} | |
], | |
"resolved_vulnerabilities": [], | |
"purl": "pkg:cargo/[email protected]", | |
"type": "cargo", | |
"namespace": "", | |
"name": "marc", | |
"version": "0.2.2", | |
"subpath": "", | |
"qualifiers": {} | |
} | |
] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
INSTALLED_APPS = [ | |
... | |
"graphene_django", | |
] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from graphene_django.views import GraphQLView | |
from vulnerabilities.graphQL_api import schema | |
urlpatterns = [ | |
..., | |
path(r"graphql", GraphQLView.as_view(graphiql=True, schema=schema)), | |
] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment