Replies: 4 comments 1 reply
-
Can you elaborate on what you mean with "back level"? |
Beta Was this translation helpful? Give feedback.
-
My bad, I should have called it 'outdated' |
Beta Was this translation helpful? Give feedback.
-
Thanks again! The following are the list of fields that are generated via the curl command above with the data for one package
What we would like to do is extract a single list of all packages that have there vulnerabilities (or none if there aren't any) and all the current versions. The curl above seems to extract just the ones with the vulnerabilities and so is probably not the correct one. I guess the same as the above information, but for packages and the current version. |
Beta Was this translation helpful? Give feedback.
-
Hi, came across this page - https://docs.dependencytrack.org/integrations/rest-api/ Guessing it is experimenting with the GET commands that I can see on mine when I run it with Swagger UI Console to see which might give me the solution. e.g. what I am seeing at the top of the list is |
Beta Was this translation helpful? Give feedback.
-
Hi
It would be useful to be able to share the packages that are back level when this information is reported on. I can extract the vulnerabilities from DT using the following command:
(000.000.000.000 - the IP address of server that DT is running on and I believe needs to be specified in the docker-compose.yml file rather than localhost for this to work remotely)
It works really well. Is there anything that we can add to this call, or make a separate one to combine with this that will allow anything related to back level to be extracted for the packages?
Many thanks
Beta Was this translation helpful? Give feedback.
All reactions