Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using vendor to filter candidates for the NVD feed #23124

Merged
merged 2 commits into from
May 2, 2024

Conversation

pereyra-m
Copy link
Member

@pereyra-m pereyra-m commented Apr 25, 2024

Related issue
Closes #23078

Description

This PR includes the vendor information inside the candidates' database only for the NVD vendor and uses it to filter the candidates during the scan. If the vendor field isn't available for the package, the scan is aborted because there isn't enough information to confirm if that's the right package and we could generate false positives.

Manual tests

The development branch was compiled and the following agents were connected:

  • Debian 12
  • Ubuntu Jammy
  • macOS Sonoma
  • Windows 10

Also, the candidates' database must be generated again because now the NVD will contain vendor data.

The log of the vulnerability scan for all the packages was analyzed
ossec.log.final.zip

Here we have some examples of the consequences of this change:

  • The package doesn't contain vendor information: this happens for absolutely all the brew packages in the macOS agent for example. That information isn't available and all the packages installed this way will require a translation. This might be fixed in another issue.
Details

2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:165 at scanPackageTranslation(): DEBUG: Translation for package 'wget' in platform 'darwin' not found. Using provided packageName.
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:576 at handleRequest(): DEBUG: Initiating a vulnerability scan for package 'wget' (pkg) ( ) with CVE Numbering Authorities (CNA) 'nvd' on Agent 'vmwares-iMac.local' (ID: '002', Version: 'v4.8.0').
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-1999-0402, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2002-1344, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2004-1487, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2004-1488, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2004-2014, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2005-3185, Content vendor: wget
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2006-6719, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2009-3490, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2010-2252, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2014-4877, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2016-4971, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2016-7098, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2017-13089, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2017-13090, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2017-6508, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2018-0494, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2018-20483, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2019-5953, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:342 at operator()(): DEBUG: The vendor information is not available for Package: wget, Version: 1.24.5, CVE: CVE-2021-31879, Content vendor: gnu
2024/04/24 14:11:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:607 at handleRequest(): DEBUG: Vulnerability scan for package 'wget' on Agent '002' has completed.
sqlite> select * from sys_programs where name like "%wget%";
     scan_id = 0
   scan_time = 2024/04/24 14:11:13
      format = pkg
        name = wget
    priority =  
     section =  
        size = 0
      vendor =  
install_time =  
     version = 1.24.5
architecture =  
   multiarch = 
      source = homebrew
 description = Internet file retriever
    location = /usr/local/Cellar
         cpe = 
    msu_name = 
    checksum = 16f028c029a9d70dbf517739d642af4ce2e91cad
     item_id = cf15b75fa23de290a28dce697d0455abe1d273f5

  • The vendor doesn't match: the Debian agent has a lot of packages that report a vendor with a personal e-mail. These packages are scanned against the NVD but their analysis is aborted because in general, the CPE of the vendor isn't the same. This is expected but more translations are needed. It also happens for some Windows agents that some translations need to be corrected or improved.
Details

2024/04/24 14:11:11 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:165 at scanPackageTranslation(): DEBUG: Translation for package 'Photos' in platform 'darwin' not found. Using provided packageName.
2024/04/24 14:11:11 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:576 at handleRequest(): DEBUG: Initiating a vulnerability scan for package 'photos' (pkg) (apple) with CVE Numbering Authorities (CNA) 'nvd' on Agent 'vmwares-iMac.local' (ID: '002', Version: 'v4.8.0').
2024/04/24 14:11:11 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:355 at operator()(): DEBUG: The vendor is not the same for Package: photos, Version: 9.0, CVE: CVE-2022-30168, Content vendor: microsoft, Package vendor: apple
2024/04/24 14:11:11 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:607 at handleRequest(): DEBUG: Vulnerability scan for package 'Photos' on Agent '002' has completed.

  • The vendor matches: this situation is the most common and in all the analyzed packages the result seems the expected one. This helps to differentiate many packages with the same name but different vendors.
Details

2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:132 at scanPackageTranslation(): DEBUG: Translation for package 'wazuh-agent' in platform 'ubuntu' found in Level 2 cache.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:140 at scanPackageTranslation(): DEBUG: Initiating a vulnerability scan for package 'wazuh' (deb) (wazuh) with CVE Numbering Authorities (CNA) 'nvd' on Agent 'b4ff2bfe4d0b' (ID: '004', Version: 'v4.7.3').
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:367 at operator()(): DEBUG: Vendor match for Package: wazuh, Version: 4.7.3-1, CVE: CVE-2018-19666, Vendor: wazuh
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2018-19666). Identified vulnerability: Version: 1.0.0. Required Version Threshold: . Required Version Threshold (or Equal): 2.1.1.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:546 at operator()(): DEBUG: No match due to default status for Package: wazuh, Version: 4.7.3-1 while scanning for Vulnerability: CVE-2018-19666
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:367 at operator()(): DEBUG: Vendor match for Package: wazuh, Version: 4.7.3-1, CVE: CVE-2021-26814, Vendor: wazuh
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2021-26814). Identified vulnerability: Version: 4.0.0. Required Version Threshold: . Required Version Threshold (or Equal): 4.0.3.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:546 at operator()(): DEBUG: No match due to default status for Package: wazuh, Version: 4.7.3-1 while scanning for Vulnerability: CVE-2021-26814
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:367 at operator()(): DEBUG: Vendor match for Package: wazuh, Version: 4.7.3-1, CVE: CVE-2021-41821, Vendor: wazuh
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2021-41821). Identified vulnerability: Version: 0. Required Version Threshold: . Required Version Threshold (or Equal): 4.1.5.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:546 at operator()(): DEBUG: No match due to default status for Package: wazuh, Version: 4.7.3-1 while scanning for Vulnerability: CVE-2021-41821
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:367 at operator()(): DEBUG: Vendor match for Package: wazuh, Version: 4.7.3-1, CVE: CVE-2021-44079, Vendor: wazuh
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2021-44079). Identified vulnerability: Version: 4.2.0. Required Version Threshold: 4.2.5. Required Version Threshold (or Equal): .
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:546 at operator()(): DEBUG: No match due to default status for Package: wazuh, Version: 4.7.3-1 while scanning for Vulnerability: CVE-2021-44079
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:367 at operator()(): DEBUG: Vendor match for Package: wazuh, Version: 4.7.3-1, CVE: CVE-2022-40497, Vendor: wazuh
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2022-40497). Identified vulnerability: Version: 3.6.1. Required Version Threshold: . Required Version Threshold (or Equal): 3.13.5.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2022-40497). Identified vulnerability: Version: 4.0.0. Required Version Threshold: . Required Version Threshold (or Equal): 4.2.7.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2022-40497). Identified vulnerability: Version: 4.3.0. Required Version Threshold: . Required Version Threshold (or Equal): 4.3.7.
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:546 at operator()(): DEBUG: No match due to default status for Package: wazuh, Version: 4.7.3-1 while scanning for Vulnerability: CVE-2022-40497
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:367 at operator()(): DEBUG: Vendor match for Package: wazuh, Version: 4.7.3-1, CVE: CVE-2023-42463, Vendor: wazuh
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:393 at operator()(): DEBUG: Scanning package - 'wazuh' (Installed Version: 4.7.3-1, Security Vulnerability: CVE-2023-42463). Identified vulnerability: Version: 0. Required Version Threshold: 4.5.3. Required Version Threshold (or Equal): .
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:546 at operator()(): DEBUG: No match due to default status for Package: wazuh, Version: 4.7.3-1 while scanning for Vulnerability: CVE-2023-42463
2024/04/24 14:12:13 wazuh-modulesd:vulnerability-scanner[11718] packageScanner.hpp:607 at handleRequest(): DEBUG: Vulnerability scan for package 'wazuh-agent' on Agent '004' has completed.

Tests

  • Compilation without warnings in every supported platform
    • Linux
  • Source installation
  • Review logs syntax and correct language
  • Added unit tests (for new features)

Notes

During these tests, some issues were found and they should be solved in other developments:

@pereyra-m pereyra-m self-assigned this Apr 25, 2024
@pereyra-m pereyra-m linked an issue Apr 25, 2024 that may be closed by this pull request
@pereyra-m pereyra-m marked this pull request as ready for review April 25, 2024 03:39
@pereyra-m
Copy link
Member Author

Update

Considering that the QA test for vulnerability detector downloads the current published candidates' DB, and this PR modifies the creation of that DB, the test will fail until the PR is merged and the feed is recreated.

It was confirmed locally that the tests pass using the candidates generated by this branch

Details

============================= test session starts ==============================
platform linux -- Python 3.10.12, pytest-7.2.2, pluggy-1.5.0 -- /usr/bin/python3
cachedir: .pytest_cache
rootdir: /workspaces/wazuh/src
collecting ... collected 12 items

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log0] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/000
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: []
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 0
PASSED                                                                   [  8%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log0]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log1] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/001
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'systemd', is vulnerable to 'CVE-2013-4392'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').", "Match found, the package 'systemd', is vulnerable to 'CVE-2020-13529'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').", "Match found, the package 'systemd', is vulnerable to 'CVE-2023-31437'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').", "Match found, the package 'systemd', is vulnerable to 'CVE-2023-31438'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').", "Match found, the package 'systemd', is vulnerable to 'CVE-2023-31439'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').", 'Deleting package agent key: test_node_name_001_ec465b7eb5fa011a336e95614072e4c7f1a65a53']
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 6
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/001/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/001/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/001/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 3 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'systemd', is vulnerable to 'CVE-2013-4392'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'systemd', is vulnerable to 'CVE-2020-13529'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'systemd', is vulnerable to 'CVE-2023-31437'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'systemd', is vulnerable to 'CVE-2023-31438'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'systemd', is vulnerable to 'CVE-2023-31439'. Current version: '247.3-7+deb11u4' (less than '' or equal to '247.3-7+deb11u4'). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:eventDeleteInventory.hpp:79 handleRequest : Deleting package agent key: test_node_name_001_ec465b7eb5fa011a336e95614072e4c7f1a65a53

PASSED                                                                   [ 16%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log1]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log2] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/002
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'nss', is vulnerable to 'CVE-2020-25648'. Current version: '3.53.1-3.el7_9' (less than '0:3.53.1-7.el7_9' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'nss', is vulnerable to 'CVE-2021-43527'. Current version: '3.53.1-3.el7_9' (less than '0:3.67.0-4.el7_9' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'nss', is vulnerable to 'CVE-2023-0767'. Current version: '3.53.1-3.el7_9' (less than '0:3.79.0-5.el7_9' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'nss', is vulnerable to 'CVE-2020-25648'. Current version: '3.53.1-3.el7_9' (less than '0:3.53.1-7.el7_9' or equal to ''). - Agent '' (ID: '002', Version: '').", "Match found, the package 'nss', is vulnerable to 'CVE-2021-43527'. Current version: '3.53.1-3.el7_9' (less than '0:3.67.0-4.el7_9' or equal to ''). - Agent '' (ID: '002', Version: '').", "Match found, the package 'nss', is vulnerable to 'CVE-2023-0767'. Current version: '3.53.1-3.el7_9' (less than '0:3.79.0-5.el7_9' or equal to ''). - Agent '' (ID: '002', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 6
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/002/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/002/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/002/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/002/input_004.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 4 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'nss', is vulnerable to 'CVE-2020-25648'. Current version: '3.53.1-3.el7_9' (less than '0:3.53.1-7.el7_9' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'nss', is vulnerable to 'CVE-2021-43527'. Current version: '3.53.1-3.el7_9' (less than '0:3.67.0-4.el7_9' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'nss', is vulnerable to 'CVE-2023-0767'. Current version: '3.53.1-3.el7_9' (less than '0:3.79.0-5.el7_9' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'nss', is vulnerable to 'CVE-2020-25648'. Current version: '3.53.1-3.el7_9' (less than '0:3.53.1-7.el7_9' or equal to ''). - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'nss', is vulnerable to 'CVE-2021-43527'. Current version: '3.53.1-3.el7_9' (less than '0:3.67.0-4.el7_9' or equal to ''). - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'nss', is vulnerable to 'CVE-2023-0767'. Current version: '3.53.1-3.el7_9' (less than '0:3.79.0-5.el7_9' or equal to ''). - Agent '' (ID: '002', Version: '').

PASSED                                                                   [ 25%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log2]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log3] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '1.6-0ubuntu3.5' (less than '1.7-0ubuntu3.5' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '2.1-1~ubuntu20.04.3' (less than '2.1-2~ubuntu20.04.3' or equal to ''). - Agent '' (ID: '002', Version: '').", "Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29800'. Current version: '2.1-1~ubuntu20.04.3' (less than '2.1-2~ubuntu20.04.2' or equal to ''). - Agent '' (ID: '002', Version: '').", "Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '2.1-1ubuntu0.21.10.2' (less than '2.1-2ubuntu0.21.10.2' or equal to ''). - Agent '' (ID: '003', Version: '').", "Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29800'. Current version: '2.1-1ubuntu0.21.10.2' (less than '2.1-2ubuntu0.21.10.1' or equal to ''). - Agent '' (ID: '003', Version: '').", "Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '2.1-1ubuntu0.22.04.2' (less than '2.1-2ubuntu0.22.04.2' or equal to ''). - Agent '' (ID: '004', Version: '').", "Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29800'. Current version: '2.1-1ubuntu0.22.04.2' (less than '2.1-2ubuntu0.22.04.1' or equal to ''). - Agent '' (ID: '004', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 7
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_004.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_005.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_006.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_007.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/003/input_008.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 7 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 8 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '1.6-0ubuntu3.5' (less than '1.7-0ubuntu3.5' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '2.1-1~ubuntu20.04.3' (less than '2.1-2~ubuntu20.04.3' or equal to ''). - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29800'. Current version: '2.1-1~ubuntu20.04.3' (less than '2.1-2~ubuntu20.04.2' or equal to ''). - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '2.1-1ubuntu0.21.10.2' (less than '2.1-2ubuntu0.21.10.2' or equal to ''). - Agent '' (ID: '003', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29800'. Current version: '2.1-1ubuntu0.21.10.2' (less than '2.1-2ubuntu0.21.10.1' or equal to ''). - Agent '' (ID: '003', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29799'. Current version: '2.1-1ubuntu0.22.04.2' (less than '2.1-2ubuntu0.22.04.2' or equal to ''). - Agent '' (ID: '004', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'networkd-dispatcher', is vulnerable to 'CVE-2022-29800'. Current version: '2.1-1ubuntu0.22.04.2' (less than '2.1-2ubuntu0.22.04.1' or equal to ''). - Agent '' (ID: '004', Version: '').

PASSED                                                                   [ 33%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log3]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log4] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.6.11-0ubuntu1~18.04.1+esm1' (less than '1.6.12-0ubuntu1~18.04.1+esm1' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.6.11-0ubuntu1~18.04.1+esm1' (less than '1.6.12-0ubuntu1~18.04.1+esm1' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.6.11-0ubuntu1~20.04.3' (less than '1.6.12-0ubuntu1~20.04.3' or equal to ''). - Agent '' (ID: '002', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.6.11-0ubuntu1~20.04.3' (less than '1.6.12-0ubuntu1~20.04.3' or equal to ''). - Agent '' (ID: '002', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.2.5-0ubuntu1~16.04.6+esm4' (less than '1.2.6-0ubuntu1~16.04.6+esm4' or equal to ''). - Agent '' (ID: '003', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.2.5-0ubuntu1~16.04.6+esm4' (less than '1.2.6-0ubuntu1~16.04.6+esm4' or equal to ''). - Agent '' (ID: '003', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.6.11-0ubuntu1~22.04.3' (less than '1.6.12-0ubuntu1~22.04.3' or equal to ''). - Agent '' (ID: '004', Version: '').", "Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.6.11-0ubuntu1~22.04.3' (less than '1.6.12-0ubuntu1~22.04.3' or equal to ''). - Agent '' (ID: '004', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 8
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_004.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_005.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_006.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_007.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/004/input_008.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 7 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 8 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.6.11-0ubuntu1~18.04.1+esm1' (less than '1.6.12-0ubuntu1~18.04.1+esm1' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.6.11-0ubuntu1~18.04.1+esm1' (less than '1.6.12-0ubuntu1~18.04.1+esm1' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.6.11-0ubuntu1~20.04.3' (less than '1.6.12-0ubuntu1~20.04.3' or equal to ''). - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.6.11-0ubuntu1~20.04.3' (less than '1.6.12-0ubuntu1~20.04.3' or equal to ''). - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.2.5-0ubuntu1~16.04.6+esm4' (less than '1.2.6-0ubuntu1~16.04.6+esm4' or equal to ''). - Agent '' (ID: '003', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.2.5-0ubuntu1~16.04.6+esm4' (less than '1.2.6-0ubuntu1~16.04.6+esm4' or equal to ''). - Agent '' (ID: '003', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25153'. Current version: '1.6.11-0ubuntu1~22.04.3' (less than '1.6.12-0ubuntu1~22.04.3' or equal to ''). - Agent '' (ID: '004', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'containerd', is vulnerable to 'CVE-2023-25173'. Current version: '1.6.11-0ubuntu1~22.04.3' (less than '1.6.12-0ubuntu1~22.04.3' or equal to ''). - Agent '' (ID: '004', Version: '').

PASSED                                                                   [ 41%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log4]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log5] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/005
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'libopenssl1_1', is vulnerable to 'CVE-2002-20001'. Current version: '1.1.0i-150100.14.42.1.x86_64' (less than '0:1.1.1l-150400.5.14' or equal to ''). - Agent '' (ID: '001', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 1
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/005/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/005/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 2 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'libopenssl1_1', is vulnerable to 'CVE-2002-20001'. Current version: '1.1.0i-150100.14.42.1.x86_64' (less than '0:1.1.1l-150400.5.14' or equal to ''). - Agent '' (ID: '001', Version: '').

PASSED                                                                   [ 50%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log5]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log6] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'cfscrape', is vulnerable to 'CVE-2017-7235'. Current version: '1.7.0' (less than '1.8.0' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'pypdf2', is vulnerable to 'CVE-2023-36464'. Current version: '2.10.5' (less than '' or equal to '3.0.1'). - Agent '' (ID: '001', Version: '')", "Match found, the package 'pypdf2', is vulnerable to 'CVE-2023-36807'. Current version: '2.10.5' (less than '2.10.6' or equal to ''). - Agent '' (ID: '001', Version: '').", "Match found, the package 'py-evm', is vulnerable to 'CVE-2018-18920'. Current version: '0.2.0a32' (less than '0.2.0a33' or equal to ''). - Agent '' (ID: '001', Version: '')", "Match found, the package 'py-evm', is vulnerable to 'CVE-2018-18920'. Current version: 'v0.2.0-alpha.32' (less than '0.2.0a33' or equal to ''). - Agent '' (ID: '001', Version: '')", "Match found, the package 'geonode', is vulnerable to 'CVE-2023-42439'. Current version: '4.1.0-1' (less than '4.1.3.post1' or equal to ''). - Agent '' (ID: '001', Version: '')"]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 6
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006/input_004.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006/input_005.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/006/input_006.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 5 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 6 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'cfscrape', is vulnerable to 'CVE-2017-7235'. Current version: '1.7.0' (less than '1.8.0' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'pypdf2', is vulnerable to 'CVE-2023-36464'. Current version: '2.10.5' (less than '' or equal to '3.0.1'). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'pypdf2', is vulnerable to 'CVE-2023-36807'. Current version: '2.10.5' (less than '2.10.6' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'py-evm', is vulnerable to 'CVE-2018-18920'. Current version: '0.2.0a32' (less than '0.2.0a33' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'py-evm', is vulnerable to 'CVE-2018-18920'. Current version: 'v0.2.0-alpha.32' (less than '0.2.0a33' or equal to ''). - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'geonode', is vulnerable to 'CVE-2023-42439'. Current version: '4.1.0-1' (less than '4.1.3.post1' or equal to ''). - Agent '' (ID: '001', Version: '').

PASSED                                                                   [ 58%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log6]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log7] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/007
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ['Processing and publish key: CVE-2024-23224', 'Processing and publish key: CVE-2024-23222', 'Processing and publish key: CVE-2024-23215', 'Processing and publish key: CVE-2024-23211', 'Processing and publish key: CVE-2024-23210', 'Processing and publish key: CVE-2024-23209', 'Processing and publish key: CVE-2024-23207', 'Processing and publish key: CVE-2024-23218', 'Processing and publish key: CVE-2024-23206', 'Processing and publish key: CVE-2024-23204', 'Processing and publish key: CVE-2024-23213', 'Processing and publish key: CVE-2024-23203', 'Processing and publish key: CVE-2023-4751', 'Processing and publish key: CVE-2023-4750', 'Processing and publish key: CVE-2023-4736', 'Processing and publish key: CVE-2023-4734', 'Processing and publish key: CVE-2024-23214', 'Processing and publish key: CVE-2023-4733', 'Processing and publish key: CVE-2023-45866', 'Processing and publish key: CVE-2023-42940', 'Processing and publish key: CVE-2023-4752', 'Processing and publish key: CVE-2023-42935', 'Processing and publish key: CVE-2023-42926', 'Processing and publish key: CVE-2023-42924', 'Processing and publish key: CVE-2023-42919', 'Processing and publish key: CVE-2023-42916', 'Processing and publish key: CVE-2023-42912', 'Processing and publish key: CVE-2024-23212', 'Processing and publish key: CVE-2023-42911', 'Processing and publish key: CVE-2024-23217', 'Processing and publish key: CVE-2023-42909', 'Processing and publish key: CVE-2023-42438', 'Processing and publish key: CVE-2023-42844', 'Processing and publish key: CVE-2023-42906', 'Processing and publish key: CVE-2023-41072', 'Processing and publish key: CVE-2023-4781', 'Processing and publish key: CVE-2023-42887', 'Processing and publish key: CVE-2023-41983', 'Processing and publish key: CVE-2023-42905', 'Processing and publish key: CVE-2023-41975', 'Processing and publish key: CVE-2023-40408', 'Processing and publish key: CVE-2023-4738', 'Processing and publish key: CVE-2023-42891', 'Processing and publish key: CVE-2023-42890', 'Processing and publish key: CVE-2023-42917', 'Processing and publish key: CVE-2023-41997', 'Processing and publish key: CVE-2023-42902', 'Processing and publish key: CVE-2023-42904', 'Processing and publish key: CVE-2023-41988', 'Processing and publish key: CVE-2023-41982', 'Processing and publish key: CVE-2023-42888', 'Processing and publish key: CVE-2023-40405', 'Processing and publish key: CVE-2023-40444', 'Processing and publish key: CVE-2023-42901', 'Processing and publish key: CVE-2023-42908', 'Processing and publish key: CVE-2023-40413', 'Processing and publish key: CVE-2023-42932', 'Processing and publish key: CVE-2023-42841', 'Processing and publish key: CVE-2023-40404', 'Processing and publish key: CVE-2023-41977', 'Processing and publish key: CVE-2023-41989', 'Processing and publish key: CVE-2023-42852', 'Processing and publish key: CVE-2023-38403', 'Processing and publish key: CVE-2023-41254', 'Processing and publish key: CVE-2023-42854', 'Processing and publish key: CVE-2024-23223', 'Processing and publish key: CVE-2023-40423', 'Processing and publish key: CVE-2023-42922', 'Processing and publish key: CVE-2023-41976', 'Processing and publish key: CVE-2023-30774', 'Processing and publish key: CVE-2023-42842', 'Processing and publish key: CVE-2023-42847', 'Processing and publish key: CVE-2023-42857', 'Processing and publish key: CVE-2023-40416', 'Processing and publish key: CVE-2023-42881', 'Processing and publish key: CVE-2023-42845', 'Processing and publish key: CVE-2023-42910', 'Processing and publish key: CVE-2023-40449', 'Processing and publish key: CVE-2023-40447', 'Processing and publish key: CVE-2023-42856', 'Processing and publish key: CVE-2023-42849', 'Processing and publish key: CVE-2023-42850', 'Processing and publish key: CVE-2023-42874', 'Processing and publish key: CVE-2023-42882', 'Processing and publish key: CVE-2023-42883', 'Processing and publish key: CVE-2024-23208', 'Processing and publish key: CVE-2023-42861', 'Processing and publish key: CVE-2023-42884', 'Processing and publish key: CVE-2023-42914', 'Processing and publish key: CVE-2023-40421', 'Processing and publish key: CVE-2023-42886', 'Processing and publish key: CVE-2023-42937', 'Processing and publish key: CVE-2023-42894', 'Processing and publish key: CVE-2023-42898', 'Processing and publish key: CVE-2023-42899', 'Processing and publish key: CVE-2023-42900', 'Processing and publish key: CVE-2023-42903', 'Processing and publish key: CVE-2023-42907', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-30774', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-38403', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40404', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40405', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40408', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40413', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40416', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40421', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40423', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40444', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40447', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-40449', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41072', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41254', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41975', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41976', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41977', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41982', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41983', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41988', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41989', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-41997', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42438', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42841', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42842', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42844', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42845', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42847', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42849', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42850', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42852', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42854', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42856', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42857', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42861', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42874', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42881', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42882', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42883', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42884', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42886', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42887', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42888', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42890', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42891', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42894', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42898', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42899', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42900', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42901', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42902', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42903', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42904', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42905', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42906', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42907', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42908', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42909', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42910', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42911', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42912', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42914', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42916', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42917', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42919', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42922', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42924', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42926', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42932', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42935', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42937', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-42940', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-45866', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4733', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4734', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4736', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4738', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4750', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4751', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4752', 'Removing element from inventory: test_node_name_001_macOS_CVE-2023-4781', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23203', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23204', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23206', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23207', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23208', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23209', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23210', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23211', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23212', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23213', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23214', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23215', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23217', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23218', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23222', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23223', 'Removing element from inventory: test_node_name_001_macOS_CVE-2024-23224']
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 196
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/007/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/007/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 2 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23224

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23222

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23215

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23211

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23210

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23209

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23207

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23218

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23206

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23204

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23213

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23203

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4750

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4736

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4734

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23214

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4733

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-45866

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42940

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4751

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4752

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42935

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42926

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42924

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42919

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42916

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42912

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23212

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42911

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23217

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42909

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42906

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42905

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42904

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42438

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42844

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41072

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4781

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42887

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41983

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42890

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40444

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40405

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42917

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41997

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42902

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41975

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40408

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-4738

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42891

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41982

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42888

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42901

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42908

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40413

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42932

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42841

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40404

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41977

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41989

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42852

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-38403

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41254

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42854

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23223

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40423

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42922

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41976

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-30774

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42842

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42847

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42857

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40416

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42881

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42845

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42910

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40449

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40447

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42856

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42849

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42850

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42874

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42882

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42883

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-23208

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42861

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42884

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42914

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-40421

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42886

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42937

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42894

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-41988

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42898

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42899

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42900

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42907

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-42903

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-30774

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-38403

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40404

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40405

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40408

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40413

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40416

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40421

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40423

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40444

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40447

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-40449

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41072

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41254

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41975

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41976

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41977

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41982

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41983

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41988

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41989

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-41997

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42438

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42841

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42842

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42844

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42845

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42847

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42849

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42850

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42852

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42854

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42856

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42857

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42861

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42874

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42881

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42882

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42883

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42884

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42886

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42887

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42888

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42890

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42891

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42894

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42898

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42899

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42900

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42901

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42902

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42903

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42904

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42905

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42906

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42907

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42908

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42909

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42910

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42911

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42912

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42914

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42916

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42917

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42919

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42922

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42924

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42926

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42932

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42935

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42937

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-42940

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-45866

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4733

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4734

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4736

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4738

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4750

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4751

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4752

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2023-4781

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23203

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23204

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23206

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23207

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23208

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23209

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23210

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23211

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23212

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23213

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23214

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23215

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23217

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23218

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23222

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23223

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_001_macOS_CVE-2024-23224

PASSED                                                                   [ 66%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log7]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log8] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/008
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ['wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21405', 'wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21372', 'wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21371', 'wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21340', 'wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21338', 'wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21341', 'wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-32040', 'Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21338', 'Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21340', 'Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21341', 'Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21371', 'Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21372', 'Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21405', 'Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21341","cvss":{"cvss3":{"base_score":6.8}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046', 'Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21338","cvss":{"cvss3":{"base_score":7.8}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"}', 'Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21340","cvss":{"cvss3":{"base_score":4.6}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"}', 'Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21371","cvss":{"cvss3":{"base_score":7.0}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"}', 'Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21372","cvss":{"cvss3":{"base_score":8.8}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"}', 'Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21405","cvss":{"cvss3":{"base_score":7.0}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"}', 'Processing and publish key: CVE-2023-32040', 'Deleting os agent vulnerabilities key: test_node_name_002_Microsoft Windows 10 Pro', 'Vulnerability report for agent ID 002, clean all OS alert.', '1:[002] () ->vulnerability-detector:{"vulnerability":{"status":"Clear","title":"There is no information of installed packages. Vulnerabilities cleared.","type":"Packages"}}']
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 23
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/008/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/008/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/008/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 3 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21372

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21371

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21340

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21338

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21341

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-32040

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2023-32040

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:resultIndexer.hpp:56 handleRequest : Processing and publish key: CVE-2024-21405

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21338

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21340

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21341

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21371

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21372

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:scanInventorySync.hpp:105 operator() : Removing element from inventory: test_node_name_002_Microsoft Windows 10 Pro_CVE-2024-21405

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21341","cvss":{"cvss3":{"base_score":6.8}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"},"published":"2024-02-13T18:15:49Z","reference":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21341","severity":"Medium","status":"Solved","title":"CVE-2024-21341 affecting Microsoft Windows 10 Pro was solved","type":"Packages","updated":"2024-04-11T20:15:20Z"}}

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21372","cvss":{"cvss3":{"base_score":8.8}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"},"published":"2024-02-13T18:15:54Z","reference":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372","severity":"High","status":"Solved","title":"CVE-2024-21372 affecting Microsoft Windows 10 Pro was solved","type":"Packages","updated":"2024-04-11T20:15:26Z"}}

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21371","cvss":{"cvss3":{"base_score":7.0}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"},"published":"2024-02-13T18:15:54Z","reference":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21371","severity":"High","status":"Solved","title":"CVE-2024-21371 affecting Microsoft Windows 10 Pro was solved","type":"Packages","updated":"2024-04-11T20:15:26Z"}}

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21405","cvss":{"cvss3":{"base_score":7.0}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"},"published":"2024-02-13T18:15:59Z","reference":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405","severity":"High","status":"Solved","title":"CVE-2024-21405 affecting Microsoft Windows 10 Pro was solved","type":"Packages","updated":"2024-04-11T20:15:29Z"}}

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21340","cvss":{"cvss3":{"base_score":4.6}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"},"published":"2024-02-13T18:15:49Z","reference":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340","severity":"Medium","status":"Solved","title":"CVE-2024-21340 affecting Microsoft Windows 10 Pro was solved","type":"Packages","updated":"2024-04-11T20:15:20Z"}}

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"cve":"CVE-2024-21338","cvss":{"cvss3":{"base_score":7.8}},"enumeration":"CVE","package":{"architecture":"x86_64","name":"Microsoft Windows 10 Pro","version":"10.0.19045.4046"},"published":"2024-02-13T18:15:49Z","reference":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338, https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/","severity":"High","status":"Solved","title":"CVE-2024-21338 affecting Microsoft Windows 10 Pro was solved","type":"Packages","updated":"2024-04-11T20:15:20Z"}}

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:cleanAgentInventory.hpp:95 operator() : Deleting os agent vulnerabilities key: test_node_name_002_Microsoft Windows 10 Pro

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:clearSendReport.hpp:77 handleRequest : Vulnerability report for agent ID 002, clean all OS alert.

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:vulnerabilityScannerFacade.cpp:121 operator() : Report sent: 1:[002] () ->vulnerability-detector:{"vulnerability":{"status":"Clear","title":"There is no information of installed packages. Vulnerabilities cleared.","type":"Packages"}}

PASSED                                                                   [ 75%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log8]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log9] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/009
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Match found, the package 'firefox' is vulnerable to 'CVE-2003-1492' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-0896' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-1970' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-2176' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-3670' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-3827' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-4013' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-5967' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2007-6715' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2008-2399' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2008-4059' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2009-2409' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2009-2469' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2009-4102' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2009-4129' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2009-4130' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2009-4630' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2011-0064' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2011-3389' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2012-4929' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2012-4930' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2014-6492' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2015-4000' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2016-7152' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2016-7153' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2018-10229' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2018-8024' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox' is vulnerable to 'CVE-2022-4066' due to default status. - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4573'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4574'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4575'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4577'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4578'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4579'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4580'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4581'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4583'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4584'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4585'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-4863'. Current version: '116.0.2-1' (less than '117.0.1' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5169'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5170'. Current version: '116.0.2-1' (less than '118.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5171'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5172'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5173'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5175'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5176'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5217'. Current version: '116.0.2-1' (less than '118.0.1' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5721'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5722'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5723'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5724'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5725'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5728'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5729'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5730'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5731'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-5732'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6135'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6204'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6205'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6206'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6207'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6208'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6209'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6210'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6211'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6212'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6213'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6856'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6858'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6859'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6860'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6861'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6863'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6864'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6865'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6866'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6867'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6869'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6871'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6872'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2023-6873'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0741'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0742'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0743'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0744'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0745'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0746'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0747'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0748'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0749'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0750'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0751'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0752'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0753'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0754'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').", "Match found, the package 'firefox', is vulnerable to 'CVE-2024-0755'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 98
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/009/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/009/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 2 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2003-1492' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-0896' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-1970' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-2176' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-3670' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-3827' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-4013' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-5967' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2007-6715' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2008-2399' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2008-4059' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2009-2409' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2009-2469' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2009-4102' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2009-4129' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2009-4130' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2009-4630' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2011-0064' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2011-3389' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2012-4929' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2012-4930' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2014-6492' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2015-4000' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2016-7152' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2016-7153' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2018-10229' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2018-8024' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'firefox' is vulnerable to 'CVE-2022-4066' due to default status. - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4573'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4574'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4575'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4577'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4578'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4579'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4580'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4581'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4583'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4584'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4585'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-4863'. Current version: '116.0.2-1' (less than '117.0.1' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5169'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5170'. Current version: '116.0.2-1' (less than '118.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5171'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5172'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5173'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5175'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5176'. Current version: '116.0.2-1' (less than '118' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5217'. Current version: '116.0.2-1' (less than '118.0.1' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5721'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5722'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5723'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5724'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5725'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5728'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5729'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5730'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5731'. Current version: '116.0.2-1' (less than '119.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-5732'. Current version: '116.0.2-1' (less than '117.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6135'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6204'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6205'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6206'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6207'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6208'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6209'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6210'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6211'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6212'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6213'. Current version: '116.0.2-1' (less than '120.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6856'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6858'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6859'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6860'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6861'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6863'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6864'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6865'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6866'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6867'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6869'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6871'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6872'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2023-6873'. Current version: '116.0.2-1' (less than '121.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0741'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0742'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0743'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0744'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0745'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0746'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0747'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0748'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0749'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0750'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0751'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0752'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0753'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0754'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:478 operator() : Match found, the package 'firefox', is vulnerable to 'CVE-2024-0755'. Current version: '116.0.2-1' (less than '122.0' or equal to ''). - Agent '' (ID: '009', Version: '').

PASSED                                                                   [ 83%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log9]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log10] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/010
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Translation for package 'Skype version 8.109' in platform 'windows' found in Level 2 cache.", "Match found, the package 'skype' is vulnerable to 'CVE-2016-5720' due to default status. - Agent '' (ID: '010', Version: '').", "Translation for package 'Skype version 8.109' in platform 'windows' found in Level 1 cache.", "Match found, the package 'skype' is vulnerable to 'CVE-2016-5720' due to default status. - Agent '' (ID: '010', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 4
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/010/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/010/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/010/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 3 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:132 scanPackageTranslation : Translation for package 'Skype version 8.109' in platform 'windows' found in Level 2 cache.

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'skype' is vulnerable to 'CVE-2016-5720' due to default status. - Agent '' (ID: '010', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:97 scanPackageTranslation : Translation for package 'Skype version 8.109' in platform 'windows' found in Level 1 cache.

PASSED                                                                   [ 91%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log10]

wazuh_modules/vulnerability_scanner/qa/test_efficacy_log.py::test_false_negatives[run_process_and_monitor_log11] 
-------------------------------- live log setup --------------------------------
DEBUG    test_efficacy_log:test_efficacy_log.py:153 Running test wazuh_modules/vulnerability_scanner/qa/test_data/011
DEBUG    test_efficacy_log:test_efficacy_log.py:175 Wating for the process to be initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 1 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:178 Process initialized
DEBUG    test_efficacy_log:test_efficacy_log.py:189 Expected lines: ["Translation for package 'Opera Stable 108.0.5067.29' in platform 'windows' found in Level 2 cache.", "Initiating a vulnerability scan for package 'opera_browser' (win) (opera) with CVE Numbering Authorities (CNA) 'nvd' on Agent '' (ID: '001', Version: '').", 'Vendor match for Package: opera_browser, Version: 108.0.5067.29, CVE: CVE-2004-2659, Vendor: opera', "Match found, the package 'opera_browser' is vulnerable to 'CVE-2004-2659' due to default status. - Agent '' (ID: '001', Version: '').", "Initiating a vulnerability scan for package 'brotli' (pkg) ( ) with CVE Numbering Authorities (CNA) 'nvd' on Agent '' (ID: '002', Version: '').", 'The vendor information is not available for Package: brotli, Version: 1.1.0, CVE: CVE-2020-8927, Content vendor: google', "Initiating a vulnerability scan for package 'mail' (pkg) (apple) with CVE Numbering Authorities (CNA) 'nvd' on Agent '' (ID: '002', Version: '').", 'The vendor is not the same for Package: mail, Version: 16.0, CVE: CVE-2008-4584, Content vendor: chilkat_software, Package vendor: apple', 'The vendor is not the same for Package: mail, Version: 16.0, CVE: CVE-2015-9097, Content vendor: mail_project, Package vendor: apple', 'The vendor is not the same for Package: mail, Version: 16.0, CVE: CVE-2017-15806, Content vendor: zetacomponents, Package vendor: apple', 'Vendor match for Package: mail, Version: 16.0, CVE: CVE-2005-2512, Vendor: apple', "Match found, the package 'mail' is vulnerable to 'CVE-2005-2512' due to default status. - Agent '' (ID: '002', Version: '')."]
DEBUG    test_efficacy_log:test_efficacy_log.py:191 Quantity expected lines: 12
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/011/input_001.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/011/input_002.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/011/input_003.json
DEBUG    test_efficacy_log:test_efficacy_log.py:89 Is rsync
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/011/input_004.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:199 Running test wazuh_modules/vulnerability_scanner/qa/test_data/011/input_005.json
DEBUG    test_efficacy_log:test_efficacy_log.py:93 Is deltas
DEBUG    test_efficacy_log:test_efficacy_log.py:220 Sending flatbuffer data
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 0 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:33 Found 5 matches
DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:132 scanPackageTranslation : Translation for package 'Opera Stable 108.0.5067.29' in platform 'windows' found in Level 2 cache.

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:140 scanPackageTranslation : Initiating a vulnerability scan for package 'opera_browser' (win) (opera) with CVE Numbering Authorities (CNA) 'nvd' on Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:367 operator() : Vendor match for Package: opera_browser, Version: 108.0.5067.29, CVE: CVE-2004-2659, Vendor: opera

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'opera_browser' is vulnerable to 'CVE-2004-2659' due to default status. - Agent '' (ID: '001', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:577 handleRequest : Initiating a vulnerability scan for package 'brotli' (pkg) ( ) with CVE Numbering Authorities (CNA) 'nvd' on Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:342 operator() : The vendor information is not available for Package: brotli, Version: 1.1.0, CVE: CVE-2020-8927, Content vendor: google

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:577 handleRequest : Initiating a vulnerability scan for package 'mail' (pkg) (apple) with CVE Numbering Authorities (CNA) 'nvd' on Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:367 operator() : Vendor match for Package: mail, Version: 16.0, CVE: CVE-2005-2512, Vendor: apple

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:532 operator() : Match found, the package 'mail' is vulnerable to 'CVE-2005-2512' due to default status. - Agent '' (ID: '002', Version: '').

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:355 operator() : The vendor is not the same for Package: mail, Version: 16.0, CVE: CVE-2008-4584, Content vendor: chilkat_software, Package vendor: apple

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:355 operator() : The vendor is not the same for Package: mail, Version: 16.0, CVE: CVE-2015-9097, Content vendor: mail_project, Package vendor: apple

DEBUG    test_efficacy_log:test_efficacy_log.py:108 Found line: wazuh-modulesd:vulnerability-scanner:packageScanner.hpp:355 operator() : The vendor is not the same for Package: mail, Version: 16.0, CVE: CVE-2017-15806, Content vendor: zetacomponents, Package vendor: apple

PASSED                                                                   [100%]
------------------------------ live log teardown -------------------------------
INFO     test_efficacy_log:test_efficacy_log.py:122 Copying /workspaces/wazuh/src/log.out to /workspaces/wazuh/src/qa_logs/log.out.test_false_negatives[run_process_and_monitor_log11]


======================== 12 passed in 74.63s (0:01:14) =========================

@pereyra-m pereyra-m force-pushed the enhancement/23078-vendor-field-when-using-nvd branch from 7833516 to a52f6fa Compare April 26, 2024 03:02
Using vendor in lower case as default
@pereyra-m pereyra-m force-pushed the enhancement/23078-vendor-field-when-using-nvd branch from a52f6fa to d5f6bfc Compare April 26, 2024 04:16
Copy link
Member

@sebasfalcone sebasfalcone left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes LGTM!

All problems that arise during this development are already triaged or solved

@Dwordcito Dwordcito merged commit c0f1876 into 4.8.0 May 2, 2024
63 of 65 checks passed
@Dwordcito Dwordcito deleted the enhancement/23078-vendor-field-when-using-nvd branch May 2, 2024 03:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Treatment of vendor field when using NVD data
3 participants