* refactor: cve_client.go * refactor: don't use global Config in private func * remove import alias for config * refactor: dbclient * refactor: resultDir * refactor: resultsDir * refactor * refactor: gost * refactor: db client * refactor: cveDB * refactor: cvedb * refactor: exploitDB * refactor: remove detector/dbclient.go * refactor: writer * refactor: syslog writer * refactor: ips * refactor: ensureResultDir * refactor: proxy * fix(db): call CloseDB * add integration test * feat(report): sort array in json * sort func for json diff * add build-int to makefile * add int-rds-redis to makefile * fix: test case, makefile * fix makefile * show cve count after diff * make diff * diff -c * sort exploits in json for diff * sort metasploit, exploit
		
			
				
	
	
		
			28 lines
		
	
	
		
			403 B
		
	
	
	
		
			TOML
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			28 lines
		
	
	
		
			403 B
		
	
	
	
		
			TOML
		
	
	
		
			Executable File
		
	
	
	
	
[cveDict]
 | 
						|
Type = "redis"
 | 
						|
Url = "redis://127.0.0.1/3"
 | 
						|
 | 
						|
[ovalDict]
 | 
						|
  Type = "redis"
 | 
						|
  Url = "redis://127.0.0.1/1"
 | 
						|
 | 
						|
[gost]
 | 
						|
  Type = "redis"
 | 
						|
  Url = "redis://127.0.0.1/2"
 | 
						|
 | 
						|
[exploit]
 | 
						|
  Type = "redis"
 | 
						|
  Url = "redis://127.0.0.1/4"
 | 
						|
 | 
						|
[metasploit]
 | 
						|
  Type = "redis"
 | 
						|
  Url = "redis://127.0.0.1/5"
 | 
						|
 | 
						|
[default]
 | 
						|
 | 
						|
[servers]
 | 
						|
 | 
						|
[servers.rails]
 | 
						|
type = "pseudo"
 | 
						|
cpeNames       = [ "cpe:/a:rubyonrails:ruby_on_rails:3.0.1" ]
 |