* refactor: cve_client.go * refactor: don't use global Config in private func * remove import alias for config * refactor: dbclient * refactor: resultDir * refactor: resultsDir * refactor * refactor: gost * refactor: db client * refactor: cveDB * refactor: cvedb * refactor: exploitDB * refactor: remove detector/dbclient.go * refactor: writer * refactor: syslog writer * refactor: ips * refactor: ensureResultDir * refactor: proxy * fix(db): call CloseDB * add integration test * feat(report): sort array in json * sort func for json diff * add build-int to makefile * add int-rds-redis to makefile * fix: test case, makefile * fix makefile * show cve count after diff * make diff * diff -c * sort exploits in json for diff * sort metasploit, exploit
28 lines
403 B
TOML
Executable File
28 lines
403 B
TOML
Executable File
[cveDict]
|
|
Type = "redis"
|
|
Url = "redis://127.0.0.1/3"
|
|
|
|
[ovalDict]
|
|
Type = "redis"
|
|
Url = "redis://127.0.0.1/1"
|
|
|
|
[gost]
|
|
Type = "redis"
|
|
Url = "redis://127.0.0.1/2"
|
|
|
|
[exploit]
|
|
Type = "redis"
|
|
Url = "redis://127.0.0.1/4"
|
|
|
|
[metasploit]
|
|
Type = "redis"
|
|
Url = "redis://127.0.0.1/5"
|
|
|
|
[default]
|
|
|
|
[servers]
|
|
|
|
[servers.rails]
|
|
type = "pseudo"
|
|
cpeNames = [ "cpe:/a:rubyonrails:ruby_on_rails:3.0.1" ]
|