* refactor: cve_client.go * refactor: don't use global Config in private func * remove import alias for config * refactor: dbclient * refactor: resultDir * refactor: resultsDir * refactor * refactor: gost * refactor: db client * refactor: cveDB * refactor: cvedb * refactor: exploitDB * refactor: remove detector/dbclient.go * refactor: writer * refactor: syslog writer * refactor: ips * refactor: ensureResultDir * refactor: proxy * fix(db): call CloseDB * add integration test * feat(report): sort array in json * sort func for json diff * add build-int to makefile * add int-rds-redis to makefile * fix: test case, makefile * fix makefile * show cve count after diff * make diff * diff -c * sort exploits in json for diff * sort metasploit, exploit
		
			
				
	
	
		
			28 lines
		
	
	
		
			573 B
		
	
	
	
		
			TOML
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			28 lines
		
	
	
		
			573 B
		
	
	
	
		
			TOML
		
	
	
		
			Executable File
		
	
	
	
	
[cveDict]
 | 
						|
  Type = "sqlite3"
 | 
						|
  SQLite3Path = "/home/ubuntu/vulsctl/docker/cve.sqlite3"
 | 
						|
 | 
						|
[ovalDict]
 | 
						|
  Type = "sqlite3"
 | 
						|
  SQLite3Path = "/home/ubuntu/vulsctl/docker/oval.sqlite3"
 | 
						|
 | 
						|
[gost]
 | 
						|
  Type = "sqlite3"
 | 
						|
  SQLite3Path = "/home/ubuntu/vulsctl/docker/gost.sqlite3"
 | 
						|
 | 
						|
[exploit]
 | 
						|
  Type = "sqlite3"
 | 
						|
  SQLite3Path = "/home/ubuntu/vulsctl/docker/go-exploitdb.sqlite3"
 | 
						|
 | 
						|
[metasploit]
 | 
						|
  type = "sqlite3"
 | 
						|
  SQLite3Path = "/home/ubuntu/vulsctl/docker/go-msfdb.sqlite3"
 | 
						|
 | 
						|
[default]
 | 
						|
 | 
						|
[servers]
 | 
						|
 | 
						|
[servers.rails]
 | 
						|
type = "pseudo"
 | 
						|
cpeNames       = [ "cpe:/a:rubyonrails:ruby_on_rails:3.0.1" ]
 |