prabhuat commited on
Commit
c9e4dfd
·
1 Parent(s): dc852fb

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +6 -5
README.md CHANGED
@@ -76,10 +76,11 @@ CREATE TABLE if not exists cve_data(
76
 
77
  ## Folders
78
 
79
- - app - Application only vulnerabilities from 2018
80
- - app-10y - Application only vulnerabilities from 2014
81
- - app-os - Application and OS vulnerabilities from 2018
82
- - app-os-10y - Application and OS vulnerabilities from 2014
 
83
 
84
  Download data.vdb6 and data.index.vdb6 files from a single folder of your choice.
85
 
@@ -135,7 +136,7 @@ Refer to the vers [documentation](https://github.com/package-url/purl-spec/blob/
135
  Search the `cve_index` table in the index database first to retrieve any matching cve_id and purl_prefix values. Use these two column values to retrieve the full CVE source information from the `cve_data` table. An example query is shown below:
136
 
137
  ```sql
138
- SELECT DISTINCT cve_id, type, namespace, name, source_data_hash, json(source_data), json(override_data), purl_prefix FROM cve_data
139
  WHERE cve_id = ? AND vers = ? AND purl_prefix = ?
140
  GROUP BY purl_prefix
141
  ORDER BY cve_id DESC;
 
76
 
77
  ## Folders
78
 
79
+ - app - Application vulnerabilities from 2018. Useful for secure code reviews.
80
+ - app-2y - Application vulnerabilities from 2024. Useful to check for the latest vulnerabilities quickly.
81
+ - app-10y - Application vulnerabilities from 2014.
82
+ - app-os - Application and OS vulnerabilities from 2018. Useful for lifecycle analysis and container SBOM scans.
83
+ - app-os-10y - Application and OS vulnerabilities from 2014.
84
 
85
  Download data.vdb6 and data.index.vdb6 files from a single folder of your choice.
86
 
 
136
  Search the `cve_index` table in the index database first to retrieve any matching cve_id and purl_prefix values. Use these two column values to retrieve the full CVE source information from the `cve_data` table. An example query is shown below:
137
 
138
  ```sql
139
+ SELECT DISTINCT cve_id, type, namespace, name, source_data_hash, json(source_data), json(override_data), vers, purl_prefix FROM cve_data
140
  WHERE cve_id = ? AND vers = ? AND purl_prefix = ?
141
  GROUP BY purl_prefix
142
  ORDER BY cve_id DESC;