You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- known_exploited: Indicator if the finding is listed in Known Exploited List. Must be TRUE, or FALSE
32
+
- ransomware_used: Indicator if the finding is used in Ransomware. Must be TRUE, or FALSE
33
+
- fix_available: Indicator if fix available for the finding. Must be TRUE, or FALSE
34
+
- kev_date: Date the finding was added to Known Exploited Vulnerabilities list in mm/dd/yyyy format or ISO format.
23
35
24
36
The CSV expects a header row with the names of the attributes.
25
37
26
38
Date fields are parsed using [dateutil.parse](https://dateutil.readthedocs.io/en/stable/parser.html) supporting a variety of formats such a YYYY-MM-DD or ISO-8601.
27
39
40
+
The list of supported fields in JSON format:
41
+
42
+
- title: **Required.** String
43
+
- severity: **Required.** One of the "Critical", "High", "Medium", "Low", "Info"
44
+
- description: **Required.** String
45
+
- date: Date
46
+
- cwe: Int
47
+
- cve: String
48
+
- epss_score: Float
49
+
- epss_percentile: Float
50
+
- cvssv3: String
51
+
- cvssv3_score: Float
52
+
- cvssv4: String
53
+
- cvssv4_score: Float
54
+
- mitigation: String
55
+
- impact: String
56
+
- steps_to_reproduce: String
57
+
- severity_justification: String
58
+
- references: String
59
+
- active: Bool
60
+
- verified: Bool
61
+
- false_p: Bool
62
+
- out_of_scope: Bool
63
+
- risk_accepted: Bool
64
+
- under_review: Bool
65
+
- is_mitigated: Bool
66
+
- thread_id: String
67
+
- mitigated: Bool
68
+
- numerical_severity: Int
69
+
- param: String
70
+
- payload: String
71
+
- line: Int
72
+
- file_path: String
73
+
- component_name: String
74
+
- component_version: String
75
+
- static_finding: Bool
76
+
- dynamic_finding: Bool
77
+
- scanner_confidence: Int
78
+
- unique_id_from_tool: String
79
+
- vuln_id_from_tool: String
80
+
- sast_source_object: String
81
+
- sast_sink_object: String
82
+
- sast_source_line: Int
83
+
- sast_source_file_path: String
84
+
- nb_occurences: Int
85
+
- publish_date: Date
86
+
- service: String
87
+
- planned_remediation_date: Date
88
+
- planned_remediation_version: String
89
+
- effort_for_fixing: One of the "High", "Medium", "Low"
Sample Generic Findings Import scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/generic).
148
227
149
228
### Default Deduplication Hashcode Fields
229
+
150
230
By default, DefectDojo identifies duplicate Findings using these [hashcode fields](https://docs.defectdojo.com/en/working_with_findings/finding_deduplication/about_deduplication/):
<p>Check out live events, upcoming features and connect with other security professionals on our <ahref="https://defectdojo.com/community">Community Page</a>.</p>
47
+
<p>Check out live events, upcoming features and connect with other security professionals on our <ahref="https://defectdojo.com/open-source">Community Page</a>.</p>
0 commit comments