fleet/server/vulnerabilities/nvd
2023-09-18 16:53:32 -06:00
..
cpe.go Handle flaky vulnerability tests (#11262) 2023-04-21 19:37:29 -04:00
cpe_matching_rule.go Fix CVE-2020-10146 false positive being detected on all Microsoft Teams versions (#13839) 2023-09-11 16:51:53 -03:00
cpe_matching_rule_test.go add CVE-2013-0340 to ignore list (#13942) 2023-09-15 16:38:33 -06:00
cpe_matching_rules.go add CVE-2013-0340 to ignore list (#13942) 2023-09-15 16:38:33 -06:00
cpe_test.go upgrade Go version to 1.21.1 (#13877) 2023-09-13 15:59:35 -03:00
cpe_translations.go Flock vulnerability false positive (#13827) 2023-09-14 10:38:36 -06:00
cpe_translations.json Flock vulnerability false positive (#13827) 2023-09-14 10:38:36 -06:00
cve.go Add version_resolved_in to software API (#13939) 2023-09-18 16:53:32 -06:00
cve_test.go Add version_resolved_in to software API (#13939) 2023-09-18 16:53:32 -06:00
db.go Fixes various bugs with NVD vulnerability detection (#7963) 2022-10-04 07:04:48 -04:00
indexed_cpe_item.go Fixes various bugs with NVD vulnerability detection (#7963) 2022-10-04 07:04:48 -04:00
README.md Flock vulnerability false positive (#13827) 2023-09-14 10:38:36 -06:00
sanitize.go Fixes various bugs with NVD vulnerability detection (#7963) 2022-10-04 07:04:48 -04:00
sanitize_test.go upgrade Go version to 1.21.1 (#13877) 2023-09-13 15:59:35 -03:00
sync.go Add Description text to CVE Metadata (#13856) 2023-09-15 11:24:10 -06:00
sync_test.go Add Description text to CVE Metadata (#13856) 2023-09-15 11:24:10 -06:00
testing_utils.go Fixes various bugs with NVD vulnerability detection (#7963) 2022-10-04 07:04:48 -04:00

Testing CPE Translations

To improve accuracy when mapping software to CVEs, we can add data to cpe_translations.json which will get picked up by the NVD repo.

To test these changes locally, you can:

  1. make the appropriate changes to cpe_translations

  2. host this file on a local web server

    ./tools/file-server 8082 ./server/vulnerabilities/nvd/cpe_translations.json
    
  3. (re)launch your local fleet server with the following --config

    vulnerabilities:
    cpe_translations_url: "http://localhost:8082/cpe_translations.json"
    
  4. trigger the vulnerabilities scan

    fleetctl trigger --name vulnerabilities