You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Include vers in cve_data to improve fix_version detection
Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>
* Show fix version in cli
Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>
* cli tests
Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>
---------
Signed-off-by: Prabhu Subramanian <prabhu@appthreat.com>
Copy file name to clipboardExpand all lines: INTEGRATION.md
+29-5Lines changed: 29 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,36 @@ When used as a Python library, the only dependency is Python >= 3.10. When using
11
11
The vulnerability database comprises two SQLite database files.
12
12
13
13
- data.index.vdb6 - A smaller index database optimized for quick purl or cpe string searches and vers-based range comparisons.
14
+
- data.vdb6 - Full CVE source database containing normalized data in CVE 5.1 specification formation and purl prefix.
14
15
15
-

16
+
### cve_index schema
16
17
17
-
- data.vdb6 - Full CVE source database containing normalized data in CVE 5.1 specification formation and purl prefix.
18
+
```sql
19
+
CREATETABLEif not exists cve_index(
20
+
cve_id TEXTNOT NULL,
21
+
type TEXTNOT NULL,
22
+
namespace TEXT,
23
+
name TEXTNOT NULL,
24
+
vers TEXTNOT NULL,
25
+
purl_prefix TEXTNOT NULL
26
+
)
27
+
```
18
28
19
-

29
+
### cve_data schema
30
+
31
+
```sql
32
+
CREATETABLEif not exists cve_data(
33
+
cve_id TEXTNOT NULL,
34
+
type TEXTNOT NULL,
35
+
namespace TEXT,
36
+
name TEXTNOT NULL,
37
+
source_data BLOB NOT NULL,
38
+
override_data BLOB,
39
+
source_data_hash TEXTNOT NULL,
40
+
vers TEXTNOT NULL,
41
+
purl_prefix TEXTNOT NULL
42
+
)
43
+
```
20
44
21
45
## Searching for CVEs
22
46
@@ -70,8 +94,8 @@ Refer to the vers [documentation](https://github.com/package-url/purl-spec/blob/
70
94
Search the `cve_index` table in the index database first to retrieve any matching cve_id and purl_prefix values. Use these two column values to retrieve the full CVE source information from the `cve_data` table. An example query is shown below:
0 commit comments