Skip to content
#

vulnerability

Here are 543 public repositories matching this topic...

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Jul 10, 2020
  • Python
computeralex92
computeralex92 commented Dec 29, 2019

In a server / client setup it would be great if Trivy would expose some metrics about the scans happen with the central server.
Some useful metrics for my implementation:

  • Last DB Update (timestamp)
  • Last DB Update Attempt (timestamp)
  • Sum of Issues found
  • Sum of Issues found splited up in SEVERITY
  • Sum of Issues found splited up in sources (OS, Python, Node etc)

As Trivy is build to

Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340

  • Updated Jul 8, 2020
  • Python
qtfkwk
qtfkwk commented Feb 16, 2016

The database is saved to and used from the current directory versus somewhere better like ~/.vfeed/. This hampers several things, but most notably putting a symlink somewhere in my path to be able to call/use vfeedcli.py from any directory (cd ~/bin; ln -s path/to/vFeed/vfeedcli.py vfeed) like a system-wide command.

Btw, I have a patch for this already and will sent a PR shortly.

Improve this page

Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.