Skip to content

JSON Report Sample

Yang, BongYeol (xeraph) edited this page Dec 20, 2021 · 2 revisions
{
    "summary": {
        "scanner_banner": "Logpresso CVE-2021-44228 Vulnerability Scanner 2.4.0 (2021-12-21)",
        "scanner_version": "2.4.0",
        "scanner_release_date": "2021-12-21",
        "hostname": "RAPH",
        "elapsed_time": 28,
        "scan_start_time": "2021-12-21 00:00:36+0900",
        "scan_end_time": "2021-12-21 00:01:04+0900",
        "scan_dir_count": 5708,
        "scan_file_count": 33842,
        "vulnerable_file_count": 1,
        "potentially_vulnerable_file_count": 0,
        "mitigated_file_count": 0,
        "fixed_file_count": 0,
        "error_file_count": 2
    },
    "files": [
        {
            "path": "d:\\tmp\\2_16\\log4j-core-2.16.0.jar",
            "status": "VULNERABLE",
            "reports": [
                {
                    "entry": "",
                    "product": "Log4j 2",
                    "version": "2.16.0",
                    "cve": "CVE-2021-45105",
                    "status": "VULNERABLE",
                    "fixed": false,
                    "detected_at": "2021-12-21 00:00:36+0900"
                }
            ]
        }
   ],
    "errors": [
        {
            "path": "d:\\tmp\\cp437\\zip_cp437_header.zip",
            "error": "Skipping broken jar file d:\\tmp\\cp437\\zip_cp437_header.zip ('MALFORMED')",
            "created_at": "2021-12-21 00:00:37+0900"
        },
        {
            "path": "d:\\tmp\\logstash-7.16.0\\vendor\\bundle\\jruby\\2.5.0\\gems\\rubyzip-1.3.0\\test\\data\\zipWithEncryption.zip",
            "error": "Skipping broken jar file d:\\tmp\\logstash-7.16.0\\vendor\\bundle\\jruby\\2.5.0\\gems\\rubyzip-1.3.0\\test\\data\\zipWithEncryption.zip ('invalid CEN header (encrypted entry)')",
            "created_at": "2021-12-21 00:00:46+0900"
        }
    ]
}
Clone this wiki locally