New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
0 CVEs are detected with cve.sqlite3 #787
Comments
Dear guys, please kindly help~ |
Found this post when I ran into a similar problem setting it up. I put the full path to the file in my config and it all worked. Maybe give that a try? This is what I put (of course make sure this is the same path for you):
|
Appreciate for Your advice, i have tried but still not working. I think I have run into other problem . Debug log shows sqldb file have been found in load but looks like no correct data are fetched. |
Fetch vulnerability databases before scanning. |
Hi Kotakanbe, I fetched all the database, I think according to the size, it contains data 😁 ll *sqlite3 |
please paste the output of
|
The log in your first post shows
I think that the path of each DB is wrong.. |
hi @kotakanbe , appreciate Your reply, because i was intended to compare with cve database without involving gostdb and ovaldb. sqlite3 ./oval.sqlite3 'select * from fetch_meta'1|suse.linux.enterprise.server.11.xml|2019-03-18 04:27:17+00:00 |
Hi @kotakanbe, I'm working together with @bestmyjj, and I had some finding about this issue based on some additional log printed by report/report.go,
In the log attached below, you can find the result of whole c.Conf. On the other hand, if you need the json files, please let me know, and I can send it to you separately. Thanks a lot! |
Hi @kotakanbe I know how to use it correctly, and this issue can be closed. Thanks a lot! |
What did you do? (required. The issue will be closed when not provided.)
Centos7 installed, vuls deployed and cve-dictionary got fetched and updated with size of 1.8G
What did you expect to happen?
CVEs are detected by report generate
What happened instead?
CVEs are not detected looks like cve.sqlite3 not even load and read.
Please re-run the command using
-debug
and provide the output below.Steps to reproduce the behaviour
vuls scan -debug
vuls report -debug
Configuration (MUST fill this out):
go version
):go1.10.1.linux-amd64.tar.gz
go env
):Centos7
Centos7
Hash : ____
To check the commit hash of HEAD
$ vuls -v
vuls v0.6.3 build-20190311_124146_53f4a29
or
$ cd $GOPATH/src/github.com/future-architect/vuls
$ git rev-parse --short HEAD
53f4a29
The text was updated successfully, but these errors were encountered: