Replies: 10 comments 11 replies
-
python client/cli/main.py CVE-2018-11777 --use-nvd --repository https://github.com/apache/hive --report html More than 1000 candidates, not useful. Specifying a version interval (2.3.3:2.3.4, based on the advisory text): python client/cli/main.py CVE-2018-11777 --use-nvd --repository https://github.com/apache/hive --report html --version-interval 2.3.3:2.3.4 Gives only 6 candidates all matching REF_JIRA_ISSUE, which is not particularly useful. Found the right commit based on the term "authorizer" appearing both in the advisory record and the commit message. |
Beta Was this translation helpful? Give feedback.
-
CVE-2019-0191 If I restricted the versions according to the vulnerability-data statement: The version string should be spelled out in 3 digits: Searching for keyword “..” would give good results (5 after using the TOKENS_IN_COMMIT_MSG filter): In all of the cases of the commit messages ( |
Beta Was this translation helpful? Give feedback.
-
CVE-2019-0193
|
Beta Was this translation helpful? Give feedback.
-
CVE-2019-9827 |
Beta Was this translation helpful? Give feedback.
-
As expected gives way too candidates. Playing around with versions did not yield to results immediately (there are 7.x, 8.x and 9.x vulnerable versions). Finally, the following worked:
Even though it gave me 300 candidates I spotted the commit with the term python client/cli/main.py CVE-2018-1304 --use-nvd --repository https://github.com/apache/tomcat --report html --version-interval 9.0.0:9.0.5 --advisory-keywords="URL pattern","context root","security constraint" The |
Beta Was this translation helpful? Give feedback.
-
CVE-2019-20445
|
Beta Was this translation helpful? Give feedback.
-
CVE-2019-10241 Vulnerable: 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older
The problem was that this repo uses version strings as: jetty-9.2.26.v20180806, jetty-9.4.16.v20190411.
|
Beta Was this translation helpful? Give feedback.
-
With the routine I already gathered so far, I already started with this:
77 candidates, but only two matching four different rules REF_JIRA_ISSUE and TOKEN_IN_*. From the commit message and changed files/content of keycloak/keycloak@0fe0b87 it was clear that it is the fix commit. |
Beta Was this translation helpful? Give feedback.
-
Gives 184 candidates but only one matches the CH_REL_PATH rule (the correct commit), which recognizes that |
Beta Was this translation helpful? Give feedback.
-
Gives 13 candidates (versions can be extracted from the advisory text). Easy to spot the right commit saying "Client marshalling improvements" (apache/ignite@82a7b82). Nonetheless, if I apply the obvious advisory keyword of |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
All reactions