feat(trivy): go mod update trivy v0.17.2 (#1235)
* feat(trivy): go mod update trivy v0.17.2 * wg.Wait * fix reporting * fix test case * add gemfile.lock of redmine to integration test * fix(test): add Pipfile.lock * add poetry.lock to integration test * add composer.lock to integration test * add integration test case
This commit is contained in:
@@ -84,14 +84,14 @@ func (h VulsHandler) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
||||
logging.Log.Errorf("Failed to fill with exploit: %+v", err)
|
||||
http.Error(w, err.Error(), http.StatusServiceUnavailable)
|
||||
}
|
||||
logging.Log.Infof("%s: %d exploits are detected", r.FormatServerName(), nExploitCve)
|
||||
logging.Log.Infof("%s: %d PoC detected", r.FormatServerName(), nExploitCve)
|
||||
|
||||
nMetasploitCve, err := detector.FillWithMetasploit(&r, config.Conf.Metasploit)
|
||||
if err != nil {
|
||||
logging.Log.Errorf("Failed to fill with metasploit: %+v", err)
|
||||
http.Error(w, err.Error(), http.StatusServiceUnavailable)
|
||||
}
|
||||
logging.Log.Infof("%s: %d modules are detected", r.FormatServerName(), nMetasploitCve)
|
||||
logging.Log.Infof("%s: %d exploits are detected", r.FormatServerName(), nMetasploitCve)
|
||||
|
||||
detector.FillCweDict(&r)
|
||||
|
||||
|
||||
Reference in New Issue
Block a user