Creating a Vulnerabilities Report
Step 1 Creating a New Report
Navigate to Application module | Security & Compliance | Reports and select Create New.
Step 2 Selecting a Scope
Select a scope to generate the list of vulnerabilities for that particular scope. You can only select one scope at a time.
Select the repositories you would like to view vulnerabilities information for in the report. You can narrow select specific repositories and include/exclude patterns to filter out specific repositories.
In each field, you can specify a list of Ant-like patterns to filter in and filter out artifact queries. Filtering works by subtracting the excluded patterns (default is none) from the included patterns (default is all).
Consider that the Include Patterns and Exclude Patterns for a repository are as follows:
Include Patterns: org/apache/**,com/acme/** Exclude Patterns: com/acme/exp-project/**
In this case, the repository is searched for
com/acme/project-x/core/1.0/nit-1.0.jar but not for
because com/acme/exp-project/** is specified as an Exclude pattern
Select the you would like to view vulnerabilities information for in the report. You can select builds by name or by pattern.
Filter your builds selection by patterns, or select to view only the latest. You can also select the number of latest build versions. The default is 1 and you can set to any number to display the latest build versions.
Release Bundles Scope
Select the release bundles you would like to view vulnerabilities information for in the report. The selection of the release bundles scope is the same as the builds scope selection.
Step 3 Using Advanced Filters
To filter out the vulnerabilities information you would like to see in the report, you can set advanced filters. Here are a few examples of how you can filter data:
Example 1: Filter by a specific CVE that was scanned on a particular date.
Example 2: Filter by CVSS2 Score, on a specific scan date, and contains a fix.
Example 3: Filter by a specific impacted artifact, published on a particular date and scan date.
Example 4: Filter by vulnerable component, and severity.
Step 4 Generating a Report
After defining the scope and filters you can generate the report. The report will run in an asynchronous mode, and will be added to the report list page. New reports will be displayed at the top of the list.
Managing the Reports List and Performing Actions on Reports
After you generate a report, it will appear in the reports list. Each report in the list will have the following information:
|The reports given name|
|The author that created the report.|
|The time when the report started running.|
The status of the report:
Progress of the report
|The number of rows in a report.|
You can perform several actions to help you manage the generated reports. In the reports list, click on the Actions drop-down to view all the possible actions, such as:
Viewing a Report
After a report completes, you can select to view it in the UI. Information such as CVE, Summary, Severity, etc are displayed in the view. You can export the report to a PDF, JSON, and CVE.
Viewing Report Details
Displays the details of the report, such as report type, the scope, and filter criteria.
Exporting a Report
You can export reports to a PDF, JSON, or CSV file. Each file format will provide you with different capabilities depending on your needs. These files can be further used by applications and tools that your organization uses to gain further analytics. Below are some examples of each file format.
REST API Support
To use REST API for generating and exporting reports, see Reports API.