Git Product home page Git Product logo

cvechecker's Introduction

cvechecker

The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning a list of installed software and matching results with the CVE database. This is not a bullet-proof method and you will have many false positives (ie: vulnerability is fixed with a revision-release, but the tool isn't able to detect the revision itself), yet it is still better than nothing, especially if you are running a distribution with little security coverage.

Quickstart

  1. Initalize the SQLite3 Database

    # cvechecker -i
  2. Load CVE and version matching rules

    # pullcves pull
  3. Generate List of Files to scan

    $ find / -type f -perm -o+x > scanlist.txt
    $ echo /proc/version >> scanlist.txt
  4. Gather List of Installed Software/Versions

    $ cvechecker -b scanlist.txt
  5. Output Matching CVE Entries

    $ cvechecker -r

More detailed installation information available via the installation docs. The homepage for this project.

cvechecker's People

Contributors

airbjorn avatar anton-hillebrand avatar cicku avatar cwarner-mdsol avatar derdakon avatar frodox avatar guijan avatar henrikbach1 avatar miska avatar sjvermeu avatar socketpair avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

cvechecker's Issues

pullcves downloads wrong pages

I've just installed the latest git snapshot and tried to populated the CVE database by running:
pullcves pull

It tries to download xml files from 2002 - 2015, but every file fails the conversion because it's not XML, it is HTML instead. It seems the site changed the structure and now serves HTML documents for the addreses the program queries. A relevant snippet for such a document (from /usr/local/var/cvechecker/cache/nvdcve-2.0-2015.xml) shows the following:

adrianp@stingray:~/temp/cvechecker$ file /usr/local/var/cvechecker/cache/nvdcve-2.0-2015.xml
/usr/local/var/cvechecker/cache/nvdcve-2.0-2015.xml: HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
adrianp@stingray:~/temp/cvechecker$ egrep "frame window|redirected to" /usr/local/var/cvechecker/cache/nvdcve-2.0-2015.xml
        <h1>You are viewing this page in an unauthorized frame window.</h1>
        <p>This is a potential security issue, you are being redirected to <a href="http://nvd.nist.gov">http://nvd.nist.gov</a></p>

Could you please check if the URL needs updating?

Question regarding the CVE false positive

Hi, just run your tools on my gentoo hardened up2date system and found several false positive CVE.

What about version detection ?
For exemple :

File "/usr/sbin/visudo" (CPE = cpe:/a:todd_miller:sudo:1.8.6:::) on host gaia (key gaia)
Potential vulnerability found (CVE-2013-2777)
CVSS Score is 4.4
Full vulnerability match (incl. edition/language)

But my version is:

[I] app-admin/sudo
Available versions: 1.8.5_p2 1.8.6_p7 ~1.8.6_p8 {ldap nls offensive pam selinux +sendmail skey}
Installed versions: 1.8.6_p7(09:37:35 29. 05. 13)(nls pam sendmail -ldap -offensive -selinux -skey)

So how I can remove those pesky annoying false positive ?

I got something like 100+ like this...
Regards,
dummys

Error pulling CVEs in MySQL mode (Segmentation fault)

I managed to configurue cvechecker using sqlite, but when i tried to configure it using mysql as a backend the CVE pulling crashes.

Converting nvdcve-1.1-2002.json to CSV... ok Loading in nvdcve-1.1-2002.csv in cvechecker. Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-1.1-2002.csv into database Segmentation fault *** Could not import nvdcve-1.1-2002.csv

the configuration in the /usr/local/etc/cvechecker.conf is:

# Generic settings
#

#dbtype = "sqlite";
dbtype="mysql";
cvecache = "/usr/local/var/cvechecker/cache";
datadir = "/usr/local/share/cvechecker";
stringcmd = "/usr/bin/strings -n 3 '@file@'";
version_url = "https://raw.github.com/sjvermeu/cvechecker/master/versions.dat";
#iuserkey = "servertag";

#
# For Sqlite3
#
sqlite3: {
  localdb = "/usr/local/var/cvechecker/local";
  globaldb = "/usr/local/var/cvechecker/global.db";
};

#
# For MySQL
#
mysql: {
      dbname = "cvechecker";
      dbuser = "cvechecker";
      dbpass = "cvecheckpass";
      dbhost = "127.0.0.1";
    };

I already used the mysql mysql_cvechecker.sql file in /data (the folder usr/share/cvechecker/ is missing).

those are my machines:

Description:	Raspbian GNU/Linux 10 (buster)
Release:	10
Codename:	buster
Description:	Ubuntu 18.04.5 LTS
Release:	18.04
Codename:	bionic

Failed to use in Ubuntu 12.04, with Please restart the command msg.

Hi
First Amazing tool.....
WoW - great work man!

I was trying to install this with MySQL on ubuntu and it failed.

The data when using pullcves pull says Some updates have occurred which might affect the database initialization. "Please restart the command.

Looking in the MySQL error seems like federated option need to be enabled.

So I restarted with this option on, and still no good,

SQLLite was working, and now I thinking of migrating this to MySQL.
But maybe u could tell how to fix it?

One more question, if I may :-)

How to run the command to check the CVE db with a package name and not a file based? Is it possible?

Thanks
And again such a great work!

pullcves pull crashing while reading versions.dat file

cvechecker -l /path-to-cache/versions.dat aborts due to problems reading some lines in the file.

These lines are:
,bzip2recover,1,bzip2recover,bzip2recover ([0-9][0-9](.[0-9]+)+): extracts blocks from damaged .bz2 files.,a,bzip,bzip2,\1,,,
,libMagickCore.so,1,libMagickCore.so.
,file:///usr/share/doc/imagemagick-([0-9][0-9](.[0-9]+)+)/index.html,a,imagemagick,imagemagick,\1,,,
,libMagickCore.so,1,libMagickCore.so.
,file:///usr/share/doc/imagemagick-([0-9][0-9](.[0-9]+)+)/index.html,a,imagemagick,libmagick_library,\1,,,
,cupsd,1,cupsd,# Subscription configuration file for CUPS v([0-9][0-9]
(.[0 -9]+)+),a,cups,cups,\1,,,
,libbfd.so,1,libbfd.so,/usr/lib64/binutils/x86_64-pc-linux-gnu/([0-9][0-9]( .[0-9]+)+)/debug,a,gnu,binutils,\1,,,
,libbfd-,1,libbfd-.
.so,/usr/lib/binutils/x86_64-pc-linux-gnu/([0-9][0-9](\ .[0-9]+)+)/debug,a,gnu,binutils,\1,,,
,libbfd-,1,libbfd-.
.so,/usr/lib64/binutils/x86_64-pc-linux-gnu/([0-9][0-9]* (.[0-9]+)+)/debug,a,gnu,binutils,\1,,,

If these lines are removed the file can be read without aborting. The problem is due to the action at cvecheck.c:715 where __strncpy_chk always fails. I believe that temppos is somehow being overwritten between line 692 where it is set and line 715 where it is used. I believe I observed this in the debugger for the .bzip2recover line, where the calculated value was 79 but the value at line 715 was 108 (which would be just enough to go past the edge of the buffer being read). Unfortunately, I can't for the life of me figure out how the code in between could overwrite that variable.

Machine specs: Darwin 12.4.0 Darwin Kernel Version 12.4.0: Wed May 1 17:57:12 PDT 2013; root:xnu-2050.24.15~1/RELEASE_X86_64 x86_64
gcc is: i686-apple-darwin11-llvm-gcc-4.2 (GCC) 4.2.1 (Based on Apple Inc. build 5658) (LLVM build 2336.11.00)
Copyright (C) 2007 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

I have not experimented with different compilers, but that might be worth trying.

"git push" missing

It looks like release "3.8" is newer than the current master. Also it would be helpful if the releases could be tagged so that they are easier identifiable in git.

Cannot figure, why a modification in `configure.ac` isn't populated into cvechecker

Hi

I cannot figure, why the modification in configure.ac:

AC_INIT([cvechecker], [4.0-modified], [[email protected]])

isn't reflected in the build:

root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-build/cvechecker-master# ./src/cvechecker --version
Database type "sqlite" is not supported.
cvechecker 4.0
root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-build/cvechecker-master# 

even though its *.c and *.h files are populated with the autoreconf command:

Screenshot from 2021-06-04 16-32-37

Thank you

Question: What am I missing? I've installed libbsd-dev, but the configure script is still complaining

Hi

What am I missing? I've installed libbsd-dev, but the configure script is still complaining:

root@33ad191e7761:/projects/cvechecker/cvechecker-2021-05-08-patched-build/cvechecker-master# ./configure --enable-sqlite3
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /usr/bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking Determining host operating system... Linux
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables... 
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking whether make supports the include directive... yes (GNU style)
checking dependency style of gcc... gcc3
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /usr/bin/grep
checking for egrep... /usr/bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking minix/config.h usability... no
checking minix/config.h presence... no
checking for minix/config.h... no
checking whether it is safe to define __EXTENSIONS__... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking for unistd.h... (cached) yes
checking argp.h usability... yes
checking argp.h presence... yes
checking for argp.h... yes
checking for string.h... (cached) yes
./configure: line 4403: syntax error near unexpected token `BSD,'
./configure: line 4403: `  PKG_CHECK_MODULES(BSD, libbsd)'

Help appreciated.

Thank you.

pullcves pull hang

Hi, did you have some commandline options to do it verbose mode ? Because it is running now for more than 1 hour without any result.

Thanks
Regards,
dummys

Make Error 2: MySQL 8.0.23-Ubuntu.20.04.1 (x64)

Hello

I tried to compile from the source code. but I'm stuck this unknown error, and can't fix it myself in this context. I can't find another ticket here either, so I'll go ahead and open one.

What I can determine is an unknown version of MySQL that is not compatible or another configuration is needed to interact with the database and cvechecker....

This is a log after running "make"

System:

OS: Ubuntu 20.04.2 LTS x86_64 
Kernel: 5.8.0-50-generic 
Shell: zsh 5.8 
Terminal: konsole
MySQL Version: 8.0.23

Console:

$ make
make  all-recursive
make[1]: Verzeichnis „/home/hx/GitHub/cvechecker“ wird betreten
Making all in src
make[2]: Verzeichnis „/home/hx/GitHub/cvechecker/src“ wird betreten
depbase=`echo cvecheck.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3 -D_USE_MYSQL   -g -O2   -MT cvecheck.o -MD -MP -MF $depbase.Tpo -c -o cvecheck.o cvecheck.c &&\
mv -f $depbase.Tpo $depbase.Po
depbase=`echo swstring.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3 -D_USE_MYSQL   -g -O2   -MT swstring.o -MD -MP -MF $depbase.Tpo -c -o swstring.o swstring.c &&\
mv -f $depbase.Tpo $depbase.Po
depbase=`echo output/stringscmd.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3 -D_USE_MYSQL   -g -O2   -MT output/stringscmd.o -MD -MP -MF $depbase.Tpo -c -o output/stringscmd.o output/stringscmd.c &&\
mv -f $depbase.Tpo $depbase.Po
depbase=`echo sqlite3/sqlite3_impl.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3 -D_USE_MYSQL   -g -O2   -MT sqlite3/sqlite3_impl.o -MD -MP -MF $depbase.Tpo -c -o sqlite3/sqlite3_impl.o sqlite3/sqlite3_impl.c &&\
mv -f $depbase.Tpo $depbase.Po
sqlite3/sqlite3_impl.c: In function ‘sqlite_dbimpl_load_databases’:
sqlite3/sqlite3_impl.c:318:23: warning: ‘main.db’ directive writing 7 bytes into a region of size between 1 and 256 [-Wformat-overflow=]
  318 |   sprintf(buffer2, "%smain.db", buffer);
      |                       ^~~~~~~
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 8 and 263 bytes into a destination of size 256
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sqlite3/sqlite3_impl.c:340:29: warning: ‘%d’ directive writing between 1 and 3 bytes into a region of size between 0 and 255 [-Wformat-overflow=]
  340 |       sprintf(buffer2, "%s%c%d.db", buffer, partchar[c], i);
      |                             ^~
sqlite3/sqlite3_impl.c:340:24: note: directive argument in the range [1, 128]
  340 |       sprintf(buffer2, "%s%c%d.db", buffer, partchar[c], i);
      |                        ^~~~~~~~~~~
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 6 and 263 bytes into a destination of size 256
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sqlite3/sqlite3_impl.c: In function ‘find_cpe_for_software’:
sqlite3/sqlite3_impl.c:1034:22: warning: ‘0)’ directive writing 2 bytes into a region of size between 1 and 4096 [-Wformat-overflow=]
 1034 |   sprintf(inset2, "%s0)", inset1);
      |                      ^~
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 3 and 4098 bytes into a destination of size 4096
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sqlite3/sqlite3_impl.c:1031:26: warning: ‘,’ directive writing 1 byte into a region of size between 0 and 4095 [-Wformat-overflow=]
 1031 |     sprintf(inset2, "%s%d,", inset1, cpeid);
      |                          ^
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 3 and 4108 bytes into a destination of size 4096
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
depbase=`echo mysql/mysql_impl.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3 -D_USE_MYSQL   -g -O2   -MT mysql/mysql_impl.o -MD -MP -MF $depbase.Tpo -c -o mysql/mysql_impl.o mysql/mysql_impl.c &&\
mv -f $depbase.Tpo $depbase.Po
mysql/mysql_impl.c: In function ‘mysql_dbimpl_add_cpe_to_database’:
mysql/mysql_impl.c:114:8: warning: implicit declaration of function ‘add_to_mysql_database’ [-Wimplicit-function-declaration]
  114 |   rc = add_to_mysql_database(ws, cpe);
      |        ^~~~~~~~~~~~~~~~~~~~~
mysql/mysql_impl.c:115:3: warning: implicit declaration of function ‘update_binmatch_files’ [-Wimplicit-function-declaration]
  115 |   update_binmatch_files(ws, rc);
      |   ^~~~~~~~~~~~~~~~~~~~~
mysql/mysql_impl.c: In function ‘add_to_mysql_database’:
mysql/mysql_impl.c:232:5: warning: implicit declaration of function ‘copy_cpe_bare’ [-Wimplicit-function-declaration]
  232 |     copy_cpe_bare(&parentcpe, &cpe);
      |     ^~~~~~~~~~~~~
gcc  -g -O2     -o cvechecker cvecheck.o swstring.o output/stringscmd.o sqlite3/sqlite3_impl.o mysql/mysql_impl.o  -lconfig -lbsd  -lsqlite3
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_clear_versiondatabase':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:20: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:20: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:20: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_clear_versiondata':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:28: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:28: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:28: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_load_databases':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:98: undefined reference to `mysql_real_connect'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:100: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:100: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_delete_binary':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:133: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:133: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:133: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `add_to_mysql_database':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:158: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:159: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:160: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:161: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:162: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: mysql/mysql_impl.o:/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:163: more undefined references to `mysql_real_escape_string' follow
/usr/bin/ld: mysql/mysql_impl.o: in function `add_to_mysql_database':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:172: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:173: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:174: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:177: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:188: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:192: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:193: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:194: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:196: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:205: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:214: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:215: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:216: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:222: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:237: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:238: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:239: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:245: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:172: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:172: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:188: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:188: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:192: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:192: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:237: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:237: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:214: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:214: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:205: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:205: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:218: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:241: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:243: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:243: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:243: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `update_binmatch_files':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:260: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:262: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:260: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:260: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:262: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:262: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_process_binary':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:282: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:283: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:284: undefined reference to `mysql_num_fields'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:286: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:282: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:282: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_verify_installed_versus_cve':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:346: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:347: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:348: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:373: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:376: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:377: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:378: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:403: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:376: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:376: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:346: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:346: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:632: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:633: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:634: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:659: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:632: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:632: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_initialize_workstate':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:667: undefined reference to `mysql_init'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:678: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:679: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:670: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:670: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_add_versiongather':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:701: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:702: undefined reference to `mysql_real_escape_string'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:705: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:706: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:706: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_initialize_databases':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:719: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:720: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:721: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:722: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:723: undefined reference to `mysql_query'
/usr/bin/ld: mysql/mysql_impl.o:/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:724: more undefined references to `mysql_query' follow
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_initialize_databases':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:747: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:747: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:720: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:720: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:719: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:719: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:722: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:722: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:721: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:721: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:723: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:723: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:727: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:727: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:724: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:724: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:726: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:726: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:730: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:730: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:731: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:731: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:734: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:734: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:735: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:735: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:736: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:736: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:737: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:737: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:738: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:738: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:739: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:739: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:740: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:740: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:743: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:743: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:744: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:744: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:745: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:745: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_report_installed':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:759: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:760: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:761: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:815: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:787: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:788: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:789: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:791: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:796: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:797: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:798: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:806: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:808: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:817: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:759: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:759: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:787: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:787: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:796: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:796: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `check_cvecpe_in_mysql_db':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:830: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:831: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:832: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:834: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:830: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:830: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_store_cve_in_db_init':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:845: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:845: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:845: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_store_cve_in_db':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:879: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:880: undefined reference to `mysql_store_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:881: undefined reference to `mysql_fetch_row'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:883: undefined reference to `mysql_free_result'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:886: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:886: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:886: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:879: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:879: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_store_cve_in_db_exit':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:897: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:897: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:897: undefined reference to `mysql_errno'
/usr/bin/ld: mysql/mysql_impl.o: in function `mysql_dbimpl_store_cve_in_db_checkpoint':
/home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:910: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:911: undefined reference to `mysql_query'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:910: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:910: undefined reference to `mysql_errno'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:911: undefined reference to `mysql_error'
/usr/bin/ld: /home/hx/GitHub/cvechecker/src/mysql/mysql_impl.c:911: undefined reference to `mysql_errno'
collect2: error: ld returned 1 exit status
make[2]: *** [Makefile:397: cvechecker] Fehler 1
make[2]: Verzeichnis „/home/hx/GitHub/cvechecker/src“ wird verlassen
make[1]: *** [Makefile:368: all-recursive] Fehler 1
make[1]: Verzeichnis „/home/hx/GitHub/cvechecker“ wird verlassen
make: *** [Makefile:309: all] Fehler 2

Error checking in sqlite_dbimpl_load_databases inconsistant (patch in document)

Index: cvechecker/src/sqlite3/sqlite3_impl.c

--- cvechecker.orig/src/sqlite3/sqlite3_impl.c
+++ cvechecker/src/sqlite3/sqlite3_impl.c
@@ -471,7 +471,7 @@ int sqlite_dbimpl_load_databases(struct
return rc;
};

  • run_statement(ws, ws->localdb[0], "PRAGMA synchronous=OFF;");

  • rc = run_statement(ws, ws->localdb[0], "PRAGMA synchronous=OFF;");
    if (rc) {
    fprintf(stderr, "Failed to run SQL statement, bailing out...\n");
    return rc;
    @@ -480,7 +480,7 @@ int sqlite_dbimpl_load_databases(struct
    for (i = 1; i <= FIELDSIZE; i++) {
    for (c = 0; c < 3; c++) {
    sprintf(buffer2, "%s%c%d.db", buffer, partchar[c], i);

  •  rc += sqlite3_open(buffer2, &(ws->localdb[i+c*FIELDSIZE]));
    
  •  rc = sqlite3_open(buffer2, &(ws->localdb[i+c*FIELDSIZE]));
    

    if (rc) {
    fprintf(stderr, "Can't open database %s: %s\n", buffer2, sqlite3_errmsg(ws->localdb[i+c_FIELDSIZE]));
    sqlite3_close(ws->localdb[i+c_FIELDSIZE]);
    @@ -492,7 +492,7 @@ int sqlite_dbimpl_load_databases(struct
    return rc;
    };

  •    run_statement(ws, ws->localdb[i+c*FIELDSIZE], "PRAGMA synchronous=OFF;");
    
  •    rc = run_statement(ws, ws->localdb[i+c*FIELDSIZE], "PRAGMA synchronous=OFF;");
    if (rc) {
      fprintf(stderr, "Failed to execute statement, bailing out...\n");
      return rc;
    

    @@ -513,10 +513,11 @@ int sqlite_dbimpl_load_databases(struct
    };
    zero_string(buffer, BUFFERSIZE);
    strncpy(buffer, config_setting_get_string(globaldb), i);

  • rc += sqlite3_open(buffer, &(ws->matchdb));

  • rc = sqlite3_open(buffer, &(ws->matchdb));
    if (rc) {
    fprintf(stderr, "Can't open database %s: %s\n", buffer, sqlite3_errmsg(ws->matchdb));
    sqlite3_close(ws->matchdb);

  • return rc;
    };

rc = run_statement(ws, ws->matchdb, "PRAGMA cache_size=10000;");
@@ -532,10 +533,11 @@ int sqlite_dbimpl_load_databases(struct
};

if (! ws->arg->initdatabases) {

  • rc += run_upgrade_fixes(ws);
  • rc = run_upgrade_fixes(ws);
    if (rc) {
    fprintf(stderr, "Some updates have occurred which might affect the database initialization.\n");
    fprintf(stderr, "Please restart the command.\n");
  •  return rc;
    
    };
    };

pullcves pull don't import anything (v3.7 and master)

The following scanf call fails on any valid input and database is not filled without reporting any error

sscanf(bufferptr, "[^:]%s", field, &pos)

Moreover gcc (4.8) complains:

gcc -DHAVE_CONFIG_H -I. -I.. -D_USE_SQLITE3 -g -O2 -MT cvecheck.o -MD -MP -MF $depbase.Tpo -c -o cvecheck.o cvecheck.c &&\ mv -f $depbase.Tpo $depbase.Po cvecheck.c: In function ‘load_cve’: cvecheck.c:1362:28: warning: too many arguments for format [-Wformat-extra-args] while (sscanf(bufferptr, "[^:]%s", field, &pos) == 1) {

CVE download data not in gzip format

I had a working installation with a daily job running a pull and scan that recently broke. It seems that there is a format issue with the file. I tried removing the file so it would re-download and that didn't work either. Any suggestions? Is this a bug on the nvdcve side?

$ pullcves pull
Downloading nvdcve-2.0-Modified.xml... ok (downloaded)
Converting nvdcve-2.0-Modified.xml to CSV...
gzip: nvdcve-2.0-Modified.xml.gz: not in gzip format
-:1: parser error : Document is empty

^
unable to parse -
ok
Gathering differences with last pull... ok
Loading in nvdcve-2.0-modified.csv differences in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-modified.delta into database
 0 records processed (0 already in db)...
Downloading versions.dat... ok (not downloaded, same file)

Cannot Detect Any Vulnerabilities

Thanks for at least the idea of building this, it's a wonderful concept, even though I haven't been able to get it to work at all.

I have done this:

Download Firefox on Alpine Linux
Observe that it is version 81
Observe that it is indeed vulnerable: https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/
pullcves pull
find / -type f -perm -o+x > /tmp/cvecheck.tmp
cat /proc/version >> /tmp/cvecheck.tmp
cvechecker -b /tmp/cvecheck.tmp

I get no output.

What do?

pullcves shows useless errors when proxy settings are missing

[root@localhost cvechecker-master]# cvechecker -i
[root@localhost cvechecker-master]# pullcves pull
Converting nvdcve-2.0-2002.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2002.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2002.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2002.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2003.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2003.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2003.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2003.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2004.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2004.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2004.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2004.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2005.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2005.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2005.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2005.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2006.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2006.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2006.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2006.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2007.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2007.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2007.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2007.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2008.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2008.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2008.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2008.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2009.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2009.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2009.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2009.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2010.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2010.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2010.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2010.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2011.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2011.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2011.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2011.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2012.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2012.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2012.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2012.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2013.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2013.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2013.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2013.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2014.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2014.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2014.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2014.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2015.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2015.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2015.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2015.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2016.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2016.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2016.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2016.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2017.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2017.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2017.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2017.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2018.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2018.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2018.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2018.csv into database
0 records processed (0 already in db)...
Converting nvdcve-2.0-2019.xml to CSV...
gzip: /usr/local/var/cvechecker/cache/nvdcve-2.0-2019.xml.gz: unexpected end of file
-:1: parser error : Document is empty
unable to parse -
ok
Loading in nvdcve-2.0-2019.csv in cvechecker.
Loading CVE data from /usr/local/var/cvechecker/cache/nvdcve-2.0-2019.csv into database
0 records processed (0 already in db)...
Downloading nvdcve-2.0-Modified.xml... ok (not downloaded, same file)
Downloading versions.dat... ok (not downloaded, same file)

Gets "Database type "sqlite" is not supported" when running own build cvechecker

Hi

When following the Quickstart to configure cvechecker I get following error:

root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master# cvechecker -i
Database type "sqlite" is not supported.
root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master# sudo apt install sqlite
Reading package lists... Done
Building dependency tree       
Reading state information... Done
sqlite is already the newest version (2.8.17-15fakesync1build1).
0 upgraded, 0 newly installed, 0 to remove and 6 not upgraded.
root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master# sudo apt install sqlite3
Reading package lists... Done
Building dependency tree       
Reading state information... Done
sqlite3 is already the newest version (3.31.1-4ubuntu0.2).
0 upgraded, 0 newly installed, 0 to remove and 6 not upgraded.
root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master# 

What am I doing wrong?

/Henrik

java archives (JAR) are not supported to detect current version in

Hi
I'm trying to use this project to check my docker image
when I try to check elasticsearch-1.4.2 which known has "CVE-2015-1427"
It doesnt put any of result on it.

below is what I done

# cvechecker -V
cvechecker 3.6
# cvechecker -D -f ./elasticsearch-1.4.2.jar
# cvechecker -d -f ./elasticsearch-1.4.2.jar
# cvechecker -r

Could anyone inform me why it cant check the CVE ?

cvechecker -S or -s prints empty values for all fields

All fields are printed as

Detected vendor="", product="",....

even though cvechecker -w /path/to/watchlist file reports adding all @700 items without error.

Also, flag -S only reports around 30 (not around 700) of these anonymous products.

No package 'libconfig' found

当我安装的时候,提示
No package 'libconfig' found

当我运行
apt-get install libconfig8-dev的时候,又提示
正在读取软件包列表... 完成
正在分析软件包的依赖关系树
正在读取状态信息... 完成
您也许需要运行“apt --fix-broken install”来修正上面的错误。
下列软件包有未满足的依赖关系:
libconfig8-dev : 依赖: libconfig-dev 但是它将不会被安装
python-webkit : 依赖: libpango1.0-0 (>= 1.14.0) 但是它将不会被安装
python-webkit-dev : 依赖: python-gtk2-dev 但是它将不会被安装
E: 有未能满足的依赖关系。请尝试不指明软件包的名字来运行“apt --fix-broken install”(也可以指定一个解决办法)。

安装不成功,怎么办?

feature request: use sqlite for acknowledgements/reporting

So i'm using sqlite and wondering if it'd make our jobs easier by storing the affected binaries/packages in a db to keep track of what is acknowledged/unacknowledged on the system instead of having to care about the stylesheet. We'd probably have to rewrite cvereport, obviously we could try to keep it compatible but it'd make report processing much easier, so for instance a brief example use case would be something like.

Usage: cvereport -d <reportdirectory> <acknowledgements>
       cvereport -d <reportdirectory> <CVEYEAR> <VERSION> <HOST> 
       cvereport --acknowledge <CVEID> --score 5.0 (where the CVSS score is greater than 5.0)
       cvereport --acknowledge <[FILE LIST]>
       cvereport --reset <CVEID> (where a CVEID is marked unacknowledged)

Or something along the lines. There is an argument that you can just run a cvechecker -r -C, pipe this output to whatever cv parser and then do things based on that, but, then that's pretty much a report. There are probably a couple of default cases we can come up with for the report but I need to write this functionality for a testing harness I wrote so any feedback you have here would be great!

configure cannot find latest sqlite3 on Ubuntu 20.04

Hi

root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-build/cvechecker-master# ./configure 
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /usr/bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking Determining host operating system... Linux
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables... 
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking for style of include used by make... GNU
checking dependency style of gcc... gcc3
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /usr/bin/grep
checking for egrep... /usr/bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking minix/config.h usability... no
checking minix/config.h presence... no
checking for minix/config.h... no
checking whether it is safe to define __EXTENSIONS__... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking for unistd.h... (cached) yes
checking argp.h usability... yes
checking argp.h presence... yes
checking for argp.h... yes
checking for regcomp... yes
checking for strchr... yes
checking for strrchr... yes
checking for strstr... yes
checking for size_t... yes
configure: WARNING: Please make sure pkg-config is installed and autoreconf run
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for CONFIG... yes
checking for SQLITE3... no
configure: error: Package requirements (sqlite3 >= 3.6.16) were not met:

No package 'sqlite3' found

Consider adjusting the PKG_CONFIG_PATH environment variable if you
installed software in a non-standard prefix.

Alternatively, you may set the environment variables SQLITE3_CFLAGS
and SQLITE3_LIBS to avoid the need to call pkg-config.
See the pkg-config man page for more details.
root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-build/cvechecker-master# sqlite3 --version
3.31.1 2020-01-27 19:55:54 3bfa9cc97da10598521b342961df8f5f68c7388fa117345eeb516eaa837balt1
root@973091faf51e:/projects/cvechecker/cvechecker-2021-05-08-build/cvechecker-master# 

What am I doing wrong?

cvechecker -i aborts while creating sqlite databases

This repeats an email message previously sent. Sorry for the duplicates.

cvechecker -i terminates abruptly while creating its 254th database in the cache directory, i.e, a85.db. This is totally repeatable.

The error occurs at sqlite3_impl.c:483. The return code is 14 which is one of the less informative of the error message. Apparently, if the sqlite libraries couldn't allocate memory to hold a database object they'd return NULL and the error message would be "out of memory" which it is not.

I changed FIELDSIZE from 128 to 64 and cvechecker -i was able to run to completion. Dunno if this was a good idea.

Database type "mysql/sqlite" is not supported

I have both mysql and sqlite installed in my machine (Ubuntu server 18.04)

~/cvechecker/cvechecker-3.9$ sqlite3 --version
3.22.0 2018-01-22 18:45:57 0c55d179733b46d8d0ba4d88e01a25e10677046ee3da1d5b1581e86726f2alt1
~/cvechecker/cvechecker-3.9$ mysql --version
mysql  Ver 14.14 Distrib 5.7.26, for Linux (x86_64) using  EditLine wrapper

Running cvechecker -i no mater what dbtype I configure in /usr/local/etc/cvechecker.conf it returns error:

~/cvechecker/cvechecker-3.9$ cvechecker -i
Database type "mysql" is not supported.
~/cvechecker/cvechecker-3.9$ cvechecker -i
Database type "sqlite" is not supported.

Any idea why this happens, any pointer ?

Inconsistent results for glibc

A few weeks before, execution of "cvechecker -r" gave some entries for glibc, which were from 2016. After updating cvechecker and the database this week and executing "cvechecker -r" again for the same watchlist, the new entries for 2016 were missing.

Code was on master with #28 applied. The missing entries are in the nvd files, but not in the data the cvechecker gets from the database in its query in the function find_cve_for_cpe().

A minimal watchlist would be:

cpe:/a:gnu:glibc:2.22:::

Help needed to understand why no CVE vulnerabilities are reported

Hi

I need help to understand why the cvechecker -rC command isn't reporting any vulnerabilities. I know that the bzip/bzip2 or better yet coreutils 8.30 application has reported CVE (https://www.cvedetails.com/version/390343/Bzip-Bzip2--.html and https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-5075/year-2020/opdos-1/GNU-Coreutils.html):

root@db5702bad469:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master/execution# cvech
ecker -b scanlist-ubuntu-20.04 
Searching for known software titles...
 - Found match for /usr/lib/x86_64-linux-gnu/libpthread-2.31.so:        cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/findmnt:    cpe:2.3:a:linux:util-linux:2.21:*:*:*:*:*:*:*
 - Found match for /usr/bin/sha512sum:  cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/csplit:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/unlink:     cpe:2.3:a:gnu:coreutils:5.7:*:*:*:*:*:*:*
 - Found match for /usr/bin/znew:       cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/whoami:     cpe:2.3:a:gnu:coreutils:5.7:*:*:*:*:*:*:*
 - Found match for /usr/bin/dir:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/pwd:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/gzip:       cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/mv: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/echo:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/tty:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/xargs:      cpe:2.3:a:gnu:findutils:4.7.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/printf:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/basename:   cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/lsattr:     cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/bin/zforce:     cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/zmore:      cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/sha384sum:  cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/iconv:      cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/fmt:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/id: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/cksum:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/chown:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/getent:     cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/expand:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/cut:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/logname:    cpe:2.3:a:gnu:coreutils:5.7:*:*:*:*:*:*:*
 - Found match for /usr/bin/du: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/zdiff:      cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/cp: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/fold:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/truncate:   cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/head:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/factor:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/od: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/uname:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/link:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/split:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/sha256sum:  cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/chattr:     cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/bin/expr:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/chmod:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/mkfifo:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/uniq:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/unexpand:   cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/yes:        cpe:2.3:a:gnu:coreutils:5.6:*:*:*:*:*:*:*
 - Found match for /usr/bin/rmdir:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/zgrep:      cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/dircolors:  cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/find:       cpe:2.3:a:gnu:findutils:4.7.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/pr: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/ptx:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/base64:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/getconf:    cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/groups:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/sha224sum:  cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/mktemp:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/nohup:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/cat:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/ls: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/nl: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/printenv:   cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/dd: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/tac:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/pathchk:    cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/localedef:  cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/localedef:  cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/install:    cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/mknod:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/mkdir:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/hostid:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/who:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/tr: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/stat:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/vdir:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/comm:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/tee:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/sha1sum:    cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/gzexe:      cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/users:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/uncompress: cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/false:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/join:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/arch:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/zcat:       cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/chcon:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/bzip2recover:       cpe:2.3:a:bzip:bzip2:1.0.8:*:*:*:*:*:*:*
 - Found match for /usr/bin/chgrp:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/rm: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/date:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/ln: cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/bash:       cpe:2.3:a:bash:bash:5.0.17:*:*:*:*:*:*:*
 - Found match for /usr/bin/tsort:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/sync:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/gunzip:     cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/env:        cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/locale:     cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/pinky:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/true:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/zcmp:       cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/runcon:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/shuf:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/zless:      cpe:2.3:a:gnu:gzip:1.10:*:*:*:*:*:*:*
 - Found match for /usr/bin/touch:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/touch:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/paste:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/shred:      cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/md5sum:     cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/readlink:   cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/nice:       cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/bin/gpgconf:    cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/gpg-zip:    cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/zipinfo:    cpe:2.3:a:info-zip:zip:5.9:*:*:*:*:*:*:*
 - Found match for /usr/bin/unzipsfx:   cpe:2.3:a:info-zip:unzip:2.3:*:*:*:*:*:*:*
 - Found match for /usr/bin/zipsplit:   cpe:2.3:a:info-zip:zip:3.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/symcryptrun:        cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/gpg-agent:  cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/openssl:    cpe:2.3:a:openssl:openssl:1.1.1f:*:*:*:*:*:*:*
 - Found match for /usr/bin/gpg-connect-agent:  cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/sprof:      cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/gpgsm:      cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/m4: cpe:2.3:a:gnu:m4:1.4.18:*:*:*:*:*:*:*
 - Found match for /usr/bin/pinentry-curses:    cpe:2.3:a:gentoo:app-crypt_pinentry:1.1.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/wget:       cpe:2.3:a:gnu:wget:1.2.11:*:*:*:*:*:*:*
 - Found match for /usr/bin/wget:       cpe:2.3:a:wget:wget:1.2.11:*:*:*:*:*:*:*
 - Found match for /usr/bin/make:       cpe:2.3:a:gnu:make:4.2.1:*:*:*:*:*:*:*
 - Found match for /usr/bin/zipnote:    cpe:2.3:a:info-zip:zip:3.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/gencat:     cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/kbxutil:    cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/rpcgen:     cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/bin/zipcloak:   cpe:2.3:a:info-zip:zip:5.8:*:*:*:*:*:*:*
 - Found match for /usr/bin/perlivp:    cpe:2.3:a:perl:perl:5.30.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/zip:        cpe:2.3:a:info-zip:zip:3.0:*:*:*:*:*:*:*
 - Found match for /usr/bin/watchgnupg: cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/gpgsplit:   cpe:2.3:a:gnupg:gnupg:2.2.19:*:*:*:*:*:*:*
 - Found match for /usr/bin/unzip:      cpe:2.3:a:info-zip:unzip:1.0:*:*:*:*:*:*:*
 - Found match for /usr/sbin/ldconfig.real:     cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/sbin/e2fsck:    cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/sbin/mke2fs:    cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/sbin/e2image:   cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/sbin/rmt-tar:   cpe:2.3:a:gnu:tar:1.30:*:*:*:*:*:*:*
 - Found match for /usr/sbin/tune2fs:   cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/sbin/iconvconfig:       cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/sbin/iconvconfig:       cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:*:*
 - Found match for /usr/sbin/dumpe2fs:  cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/sbin/debugfs:   cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
 - Found match for /usr/sbin/chroot:    cpe:2.3:a:gnu:coreutils:8.30:*:*:*:*:*:*:*
 - Found match for /usr/sbin/resize2fs: cpe:2.3:a:ext2_filesystems_utilities:e2fsprogs:1.45.5:*:*:*:*:*:*:*
root@db5702bad469:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master/execution# cvech
ecker -rC
Outputversion,File,CPE,CVE,CVSS,Matchtype,Hostname,Userkey
root@db5702bad469:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master/execution# cvechecker -rS
Detected vendor="gnu", product="glibc", version="2.31", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/sbin/iconvconfig
  - /usr/sbin/ldconfig.real
  - /usr/bin/rpcgen
  - /usr/bin/gencat
  - /usr/bin/sprof
  - /usr/bin/locale
  - /usr/bin/localedef
  - /usr/bin/getconf
  - /usr/bin/getent
  - /usr/bin/iconv
  - /usr/lib/x86_64-linux-gnu/libpthread-2.31.so

Detected vendor="gnu", product="coreutils", version="8.30", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/sbin/chroot
  - /usr/bin/nice
  - /usr/bin/readlink
  - /usr/bin/md5sum
  - /usr/bin/shred
  - /usr/bin/paste
  - /usr/bin/touch
  - /usr/bin/shuf
  - /usr/bin/runcon
  - /usr/bin/true
  - /usr/bin/pinky
  - /usr/bin/env
  - /usr/bin/sync
  - /usr/bin/tsort
  - /usr/bin/ln
  - /usr/bin/date
  - /usr/bin/rm
  - /usr/bin/chgrp
  - /usr/bin/chcon
  - /usr/bin/arch
  - /usr/bin/join
  - /usr/bin/false
  - /usr/bin/users
  - /usr/bin/sha1sum
  - /usr/bin/tee
  - /usr/bin/comm
  - /usr/bin/vdir
  - /usr/bin/stat
  - /usr/bin/tr
  - /usr/bin/who
  - /usr/bin/hostid
  - /usr/bin/mkdir
  - /usr/bin/mknod
  - /usr/bin/install
  - /usr/bin/pathchk
  - /usr/bin/tac
  - /usr/bin/dd
  - /usr/bin/printenv
  - /usr/bin/nl
  - /usr/bin/ls
  - /usr/bin/cat
  - /usr/bin/nohup
  - /usr/bin/mktemp
  - /usr/bin/sha224sum
  - /usr/bin/groups
  - /usr/bin/base64
  - /usr/bin/ptx
  - /usr/bin/pr
  - /usr/bin/dircolors
  - /usr/bin/rmdir
  - /usr/bin/unexpand
  - /usr/bin/uniq
  - /usr/bin/mkfifo
  - /usr/bin/chmod
  - /usr/bin/expr
  - /usr/bin/sha256sum
  - /usr/bin/split
  - /usr/bin/link
  - /usr/bin/uname
  - /usr/bin/od
  - /usr/bin/factor
  - /usr/bin/head
  - /usr/bin/truncate
  - /usr/bin/fold
  - /usr/bin/cp
  - /usr/bin/du
  - /usr/bin/cut
  - /usr/bin/expand
  - /usr/bin/chown
  - /usr/bin/cksum
  - /usr/bin/id
  - /usr/bin/fmt
  - /usr/bin/sha384sum
  - /usr/bin/basename
  - /usr/bin/printf
  - /usr/bin/tty
  - /usr/bin/echo
  - /usr/bin/mv
  - /usr/bin/pwd
  - /usr/bin/dir
  - /usr/bin/csplit
  - /usr/bin/sha512sum

Detected vendor="gnu", product="coreutils", version="5.7", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/logname
  - /usr/bin/whoami
  - /usr/bin/unlink

Detected vendor="gnu", product="gzip", version="1.10", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/zless
  - /usr/bin/zcmp
  - /usr/bin/gunzip
  - /usr/bin/zcat
  - /usr/bin/uncompress
  - /usr/bin/gzexe
  - /usr/bin/zgrep
  - /usr/bin/zdiff
  - /usr/bin/zmore
  - /usr/bin/zforce
  - /usr/bin/gzip
  - /usr/bin/znew

Detected vendor="gnu", product="findutils", version="4.7.0", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/find
  - /usr/bin/xargs

Detected vendor="gnu", product="coreutils", version="5.6", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/yes

Detected vendor="gnu", product="m4", version="1.4.18", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/m4

Detected vendor="gnu", product="make", version="4.2.1", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/make

Detected vendor="gnu", product="tar", version="1.30", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/sbin/rmt-tar

Detected vendor="bzip", product="bzip2", version="1.0.8", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/bzip2recover

Detected vendor="bash", product="bash", version="5.0.17", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/bash

Detected vendor="wget", product="wget", version="1.2.11", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/wget

Detected vendor="perl", product="perl", version="5.30.0", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/perlivp

Detected vendor="linux", product="util-linux", version="2.21", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/findmnt

Detected vendor="gnupg", product="gnupg", version="2.2.19", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/gpgsplit
  - /usr/bin/watchgnupg
  - /usr/bin/kbxutil
  - /usr/bin/gpgsm
  - /usr/bin/gpg-connect-agent
  - /usr/bin/gpg-agent
  - /usr/bin/symcryptrun
  - /usr/bin/gpg-zip
  - /usr/bin/gpgconf

Detected vendor="gentoo", product="app-crypt_pinentry", version="1.1.0", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/pinentry-curses

Detected vendor="openssl", product="openssl", version="1.1.1f", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/openssl

Detected vendor="info-zip", product="zip", version="5.9", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/zipinfo

Detected vendor="info-zip", product="unzip", version="2.3", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/unzipsfx

Detected vendor="info-zip", product="zip", version="3.0", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/zip
  - /usr/bin/zipnote
  - /usr/bin/zipsplit

Detected vendor="info-zip", product="zip", version="5.8", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/zipcloak

Detected vendor="info-zip", product="unzip", version="1.0", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/bin/unzip

Detected vendor="ext2_filesystems_utilities", product="e2fsprogs", version="1.45.5", update="", edition="", language="", sw_edition="", target_sw="", target_hw="", other="" on host="db5702bad469", userkey="db5702bad469"
Files that contributed to this detection:
  - /usr/sbin/resize2fs
  - /usr/sbin/debugfs
  - /usr/sbin/dumpe2fs
  - /usr/sbin/tune2fs
  - /usr/sbin/e2image
  - /usr/sbin/mke2fs
  - /usr/sbin/e2fsck
  - /usr/bin/chattr
  - /usr/bin/lsattr

root@db5702bad469:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master/execution# cvechecker -rC
Outputversion,File,CPE,CVE,CVSS,Matchtype,Hostname,Userkey
root@db5702bad469:/projects/cvechecker/cvechecker-2021-05-08-master-build/cvechecker-master/execution# 

What am I doing wrong?

missing CPE version 2.3 support

cvechecker uses feeds, now in json format only, from NIST.

But it seems that while the "old" (e.g., two years old) feeds still have a mix of CPE 2.2 and CPE 2.3 entries, the newest feeds only have CPE 2.3 entries and I can't find any possibility to have those analyzed, unless we find a sort of conversion possibility (?).

For example if I type:

$ echo 'cpe:/a:sqlite:sqlite:3.6.0:::' > small.txt
$ cvechecker -w small.txt 
Adding CPE entries
 - Added watch for cpe:/a:sqlite:sqlite:3.6.0:::
$ cvechecker -r => nothing

It is not finding https://nvd.nist.gov/vuln/detail/CVE-2019-8457 which involves this version of sqlite.

It looks like in nvdcve-1.1-2019.json for example only the 2.3 version of CPEs are listed and not the 2.2 versions anymore..

I see for this CVE:

        "cpe_match": [
          {
            "vulnerable": true,
            "cpe23Uri": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
            "versionStartIncluding": "3.6.0",
            "versionEndIncluding": "3.27.2"
          }
        ]

Now if I try to use a CPE in the 2.3 version format with cvechecker,
I get the following error:

$ echo 'cpe:2.3:a:sqlite:sqlite:3.6.0:*:*:*:*:*:*:*' > small.txt
$ cvechecker -w small.txt 
Adding CPE entries
 ! An error occurred while interpreting CPE on line 0

So.. I guess we are stuck until the tool can add CPEs to watch in the 2.3 version format.

ebuild for 4.0

As you wrote here:

...so I suggest you just take the app-admin/cvechecker and put it in your own overlay

But there is only ebuild for 3.5 and live version use old deperched git-2 eclass

Sourceforge 3.4 distribution missing LICENSE file

Hi!

Yocto prefers to grab stable releases than to pull direct from git repository, so I decided to grab the release from sourceforge now that it's available. The project has to be quite obsessive about tracking licenses, and so forth, so it promptly notified me that there was no license file in the download.

Nothing has been returned, please help

Hello,
I used alpine linux,

apk add cvechecker
cvechecker -i
pullcves pull
find / -type f -perm -o+x > scanlist.txt
cat /proc/version >> scanlist.txt

it's all OK.
but i run cvechecker -b scanlist.txt
only return "Searching for known software titles..."

ccvechecker -f /proc/version is nothing return...

please help me , thank you

cvechecker -b complains about updates

cvechecker -b /tmp/cvechecker-scanlist.txt
Some updates have occurred which might affect the database initialization.
Please restart the command.
cvechecker -b /tmp/cvechecker-scanlist.txt
Some updates have occurred which might affect the database initialization.
Please restart the command.

version 3.5
mysql

Missing package in tutorial. "Make" generates alot of noise. Drop root user requirement.

I followed this tutorial: https://github.com/sjvermeu/cvechecker/wiki/Installation#manual-any-linux-distribution

$ sudo apt-get install -y sqlite3 libconfig-dev libsqlite3-dev autoconf xsltproc
# ...
$ git clone https://github.com/sjvermeu/cvechecker.git
# ...
$ cd cvechecker
$ autoreconf --force --install
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking Determining host operating system... Linux
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables... 
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking whether make supports the include directive... yes (GNU style)
checking dependency style of gcc... gcc3
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /bin/grep
checking for egrep... /bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking minix/config.h usability... no
checking minix/config.h presence... no
checking for minix/config.h... no
checking whether it is safe to define __EXTENSIONS__... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking for unistd.h... (cached) yes
checking argp.h usability... yes
checking argp.h presence... yes
checking for argp.h... yes
checking for string.h... (cached) yes
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for gethostname... yes
checking for memset... yes
checking for regcomp... yes
checking for strchr... yes
checking for strrchr... yes
checking for strstr... yes
checking for strlcpy... no
checking for BSD... no
configure: error: Package requirements (libbsd) were not met:

No package 'libbsd' found

Consider adjusting the PKG_CONFIG_PATH environment variable if you
installed software in a non-standard prefix.

Alternatively, you may set the environment variables BSD_CFLAGS
and BSD_LIBS to avoid the need to call pkg-config.
See the pkg-config man page for more details.

Looks like package libbsd-dev is missing in your list:
sudo apt-get install libbsd-dev

BTW: i drop mysql support:

$ ./configure --enable-sqlite3 
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking Determining host operating system... Linux
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables... 
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking whether make supports the include directive... yes (GNU style)
checking dependency style of gcc... gcc3
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /bin/grep
checking for egrep... /bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking minix/config.h usability... no
checking minix/config.h presence... no
checking for minix/config.h... no
checking whether it is safe to define __EXTENSIONS__... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking for unistd.h... (cached) yes
checking argp.h usability... yes
checking argp.h presence... yes
checking for argp.h... yes
checking for string.h... (cached) yes
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for gethostname... yes
checking for memset... yes
checking for regcomp... yes
checking for strchr... yes
checking for strrchr... yes
checking for strstr... yes
checking for strlcpy... no
checking for BSD... yes
checking for size_t... yes
configure: WARNING: Please make sure pkg-config is installed and autoreconf run
checking for BSD... yes
checking for CONFIG... yes
checking for SQLITE3... yes
checking that generated files are newer than configure... done
configure: creating ./config.status
config.status: creating Makefile
config.status: creating src/Makefile
config.status: creating data/Makefile
config.status: creating conf/Makefile
config.status: creating scripts/Makefile
config.status: creating docs/Makefile
config.status: creating config.h
config.status: config.h is unchanged
config.status: executing depfiles commands

But make produces a lot of noise:

$ make
make  all-recursive
make[1]: Entering directory '/home/dani/dev/cvechecker'
Making all in src
make[2]: Entering directory '/home/dani/dev/cvechecker/src'
depbase=`echo cvecheck.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3    -g -O2   -MT cvecheck.o -MD -MP -MF $depbase.Tpo -c -o cvecheck.o cvecheck.c &&\
mv -f $depbase.Tpo $depbase.Po
depbase=`echo swstring.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3    -g -O2   -MT swstring.o -MD -MP -MF $depbase.Tpo -c -o swstring.o swstring.c &&\
mv -f $depbase.Tpo $depbase.Po
depbase=`echo output/stringscmd.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3    -g -O2   -MT output/stringscmd.o -MD -MP -MF $depbase.Tpo -c -o output/stringscmd.o output/stringscmd.c &&\
mv -f $depbase.Tpo $depbase.Po
depbase=`echo sqlite3/sqlite3_impl.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3    -g -O2   -MT sqlite3/sqlite3_impl.o -MD -MP -MF $depbase.Tpo -c -o sqlite3/sqlite3_impl.o sqlite3/sqlite3_impl.c &&\
mv -f $depbase.Tpo $depbase.Po
sqlite3/sqlite3_impl.c: In function ‘sqlite_dbimpl_load_databases’:
sqlite3/sqlite3_impl.c:318:23: warning: ‘main.db’ directive writing 7 bytes into a region of size between 1 and 256 [-Wformat-overflow=]
  318 |   sprintf(buffer2, "%smain.db", buffer);
      |                       ^~~~~~~
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 8 and 263 bytes into a destination of size 256
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sqlite3/sqlite3_impl.c:340:29: warning: ‘%d’ directive writing between 1 and 3 bytes into a region of size between 0 and 255 [-Wformat-overflow=]
  340 |       sprintf(buffer2, "%s%c%d.db", buffer, partchar[c], i);
      |                             ^~
sqlite3/sqlite3_impl.c:340:24: note: directive argument in the range [1, 128]
  340 |       sprintf(buffer2, "%s%c%d.db", buffer, partchar[c], i);
      |                        ^~~~~~~~~~~
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 6 and 263 bytes into a destination of size 256
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sqlite3/sqlite3_impl.c: In function ‘find_cpe_for_software’:
sqlite3/sqlite3_impl.c:1034:22: warning: ‘0)’ directive writing 2 bytes into a region of size between 1 and 4096 [-Wformat-overflow=]
 1034 |   sprintf(inset2, "%s0)", inset1);
      |                      ^~
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 3 and 4098 bytes into a destination of size 4096
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
sqlite3/sqlite3_impl.c:1031:26: warning: ‘,’ directive writing 1 byte into a region of size between 0 and 4095 [-Wformat-overflow=]
 1031 |     sprintf(inset2, "%s%d,", inset1, cpeid);
      |                          ^
In file included from /usr/include/stdio.h:867,
                 from sqlite3/../swstring.h:2,
                 from sqlite3/sqlite3_impl.h:6,
                 from sqlite3/sqlite3_impl.c:1:
/usr/include/x86_64-linux-gnu/bits/stdio2.h:36:10: note: ‘__builtin___sprintf_chk’ output between 3 and 4108 bytes into a destination of size 4096
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
      |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   37 |       __bos (__s), __fmt, __va_arg_pack ());
      |       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
depbase=`echo dummy/dummy_mysql.o | sed 's|[^/]*$|.deps/&|;s|\.o$||'`;\
gcc -DHAVE_CONFIG_H -I. -I..  -D_USE_SQLITE3    -g -O2   -MT dummy/dummy_mysql.o -MD -MP -MF $depbase.Tpo -c -o dummy/dummy_mysql.o dummy/dummy_mysql.c &&\
mv -f $depbase.Tpo $depbase.Po
gcc  -g -O2     -o cvechecker cvecheck.o swstring.o output/stringscmd.o sqlite3/sqlite3_impl.o dummy/dummy_mysql.o  -lconfig -lbsd -lsqlite3
make[2]: Leaving directory '/home/dani/dev/cvechecker/src'
Making all in data
make[2]: Entering directory '/home/dani/dev/cvechecker/data'
make[2]: Nothing to be done for 'all'.
make[2]: Leaving directory '/home/dani/dev/cvechecker/data'
Making all in conf
make[2]: Entering directory '/home/dani/dev/cvechecker/conf'
rm -f cvechecker.conf cvechecker.conf.tmp
srcdir=''; \
  test -f ./cvechecker.conf.in || srcdir=./; \
  sed -e 's|@localstatedir[@]|/usr/local/var|g' -e 's|@pkgdatadir[@]|/usr/local/share/cvechecker|g' ${srcdir}cvechecker.conf.in > cvechecker.conf.tmp
chmod a-w cvechecker.conf.tmp
mv cvechecker.conf.tmp cvechecker.conf
make[2]: Leaving directory '/home/dani/dev/cvechecker/conf'
Making all in scripts
make[2]: Entering directory '/home/dani/dev/cvechecker/scripts'
make[2]: Nothing to be done for 'all'.
make[2]: Leaving directory '/home/dani/dev/cvechecker/scripts'
Making all in docs
make[2]: Entering directory '/home/dani/dev/cvechecker/docs'
make[2]: Nothing to be done for 'all'.
make[2]: Leaving directory '/home/dani/dev/cvechecker/docs'
make[2]: Entering directory '/home/dani/dev/cvechecker'
make[2]: Leaving directory '/home/dani/dev/cvechecker'
make[1]: Leaving directory '/home/dani/dev/cvechecker'

Is that ok?

My System:

  • non-root user
  • Ubuntu 20.04

Make

$ make -v
GNU Make 4.2.1
Built for x86_64-pc-linux-gnu
Copyright (C) 1988-2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

cvechecker deafult password

I just installed blackarch tools on vanilla arch using strap...and on the packages cvechecker was included.After the sucessful installation(after some strugless) I noticed that a new user was created called svechecker. Now i tried the password root, blackarch, cvechecker and my deafult user password and none of them worked.If anyone could help me I would greatly appreciate it.

Centos6.10 installation is not successful

[root@localhost cvechecker-master]# ./configure --enable-sqlite3
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /bin/mkdir -p
checking for gawk... gawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking Determining host operating system... Linux
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables...
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking for style of include used by make... GNU
checking dependency style of gcc... gcc3
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /bin/grep
checking for egrep... /bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking minix/config.h usability... no
checking minix/config.h presence... no
checking for minix/config.h... no
checking whether it is safe to define EXTENSIONS... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking for unistd.h... (cached) yes
checking argp.h usability... yes
checking argp.h presence... yes
checking for argp.h... yes
checking for regcomp... yes
checking for strchr... yes
checking for strrchr... yes
checking for strstr... yes
checking for size_t... yes
configure: WARNING: Please make sure pkg-config is installed and autoreconf run
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for CONFIG... yes
checking for SQLITE3... yes
checking that generated files are newer than configure... done
configure: creating ./config.status
config.status: error: cannot find input file: `Makefile.in'

how to disable sqllite3

Hi, I just install cvechecker and got error:

./configure --enable-mysql-server

checking pkg-config is at least version 0.9.0... yes
checking for CONFIG... yes
checking for SQLITE3... no
configure: error: Package requirements (sqlite3 >= 3.6.16) were not met:

No package 'sqlite3' found.

How can I disable sqlist3 check?

Thank you.

segfault in validate_cve_data()

When reading strings w/out version fields during pull phase.

Patch coming up.

Also, a patch so that pullcves exits if cvechecker call fail to complete successfully.

"pullcves pull" can't process nvdcve-2.0-2014.csv

When trying to process the files nvdcve-2.0-2014.csv and nvdcve-2.0-2016.csv, the process terminates at one point.

The error message which shows up is following:

! Error while reading in CVE entries: CPE type in line 80867 is not one of a/o/h

The line is different for 2016, but the reason and the error are the same.

The reason for that is a configuration error in the respective .xml file, which results in following csv line:

"CVE-2014-3672:2.1:cpe:/:::::~~~x86~~"

This line however is invalid and causes the error above.

Cannot build since commit 71745c5

Since commit 71745c5 this project cannot be built anymore due to data/nvdcve2simple.xsl file removal. References to that file shall be removed from Makefile too.

As workaround an user can readd that file before the build.

SSHD detection is not supported

I feel SSHD is an important service, but this tool does not test it。
Or maybe I'm using it the wrong way?
my sshd is in /usr/bin/sshd

autoconf fails

Hello!

I've tried to use CVEchecker some time ago, and I decided to try it again, but using the development version (just git clone-ing from the repo) goes nowhere.

If I just run autoconf (2.69 on a Debian Squeeze) it gives the following error:

configure.ac:3: error: possibly undefined macro: AM_INIT_AUTOMAKE
      If this token and others are legitimate, please use m4_pattern_allow.
      See the Autoconf documentation.
configure.ac:27: error: possibly undefined macro: AM_PROG_CC_C_O
configure.ac:52: error: possibly undefined macro: AM_CONDITIONAL

If I try aclocal ; autoheader ; automake --add-missing ; autoconf, it succeeds, but then I can't use even sqlite3 (and MYSQL is commented out in the src/Makefile, but uncommenting it changes nothing) backend.

So, would you mind updating the documentation? Thanks!

pullcve parsing error

I just installed blackarch tools on Antergos using strap...and on the packages cvechecker was included.After the sucessful installation(after some strugless) I did a pullcves pull

The result is :

`...snip...
var/cvechecker/cache/nvdcve-2.0-modified.xml:290: parser error : Entity 'reg' not defined
ere is an addition or modification to any vulnerability with a starting CVE®
^
/var/cvechecker/cache/nvdcve-2.0-modified.xml:366: parser error : Opening and ending tag mismatch: br line 364 and div

^
/var/cvechecker/cache/nvdcve-2.0-modified.xml:367: parser error : Opening and ending tag mismatch: br line 363 and div

^
/var/cvechecker/cache/nvdcve-2.0-modified.xml:397: parser error : xmlParseEntityRef: no name
Search & Statistics

^
/var/cvechecker/cache/nvdcve-2.0-modified.xml:456: parser error : xmlParseEntityRef: no name
General Questions & Webmaster Contact <
^
/var/cvechecker/cache/nvdcve-2.0-modified.xml:505: parser error : Opening and ending tag mismatch: div line 361 and footer

^ /var/cvechecker/cache/nvdcve-2.0-modified.xml:524: parser error : Opening and ending tag mismatch: div line 314 and form ^ /var/cvechecker/cache/nvdcve-2.0-modified.xml:525: parser error : Opening and ending tag mismatch: footer line 313 and body ^ /var/cvechecker/cache/nvdcve-2.0-modified.xml:526: parser error : Opening and ending tag mismatch: section line 261 and html ^ /var/cvechecker/cache/nvdcve-2.0-modified.xml:527: parser error : Premature end of data in tag nav line 81

^
...snip....`

What could cause that problem ?

Thanks

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.