Showing
3 changed files
with
6 additions
and
38 deletions
... | @@ -64,11 +64,7 @@ namespace VulnCrawler | ... | @@ -64,11 +64,7 @@ namespace VulnCrawler |
64 | } | 64 | } |
65 | 65 | ||
66 | /* 메인 동작 함수 */ | 66 | /* 메인 동작 함수 */ |
67 | - public static void Run() { | 67 | + public static void Run() { |
68 | - | ||
69 | - | ||
70 | - | ||
71 | - | ||
72 | // Repository 폴더들이 있는 주소를 지정하면 하위 폴더 목록을 가져옴(Repository 목록) | 68 | // Repository 폴더들이 있는 주소를 지정하면 하위 폴더 목록을 가져옴(Repository 목록) |
73 | Regex.CacheSize = 50; | 69 | Regex.CacheSize = 50; |
74 | 70 | ||
... | @@ -88,35 +84,6 @@ namespace VulnCrawler | ... | @@ -88,35 +84,6 @@ namespace VulnCrawler |
88 | { | 84 | { |
89 | continue; | 85 | continue; |
90 | } | 86 | } |
91 | - //var crawler = new VulnC(); | ||
92 | - //crawler.Init(directory); | ||
93 | - | ||
94 | - //Tree commitTree1 = crawler.Repository.Lookup<Commit>("e589db7a6a9c8f1557007f2cc765ee28ad7a1edd").Tree; | ||
95 | - ////Tree parentTree1 = crawler.Repository.Lookup<Commit>("344ba37bdc299660e1b1693b6999e5fe116893e1").Tree; | ||
96 | - | ||
97 | - //Commit commit = crawler.Repository.Lookup<Commit>("e589db7a6a9c8f1557007f2cc765ee28ad7a1edd"); | ||
98 | - | ||
99 | - //foreach (var parent in commit.Parents) | ||
100 | - //{ | ||
101 | - // Console.WriteLine($"Parent ID:{parent.Sha}"); | ||
102 | - // Tree commitTree = commit.Tree; | ||
103 | - // Tree parentTree = parent.Tree; | ||
104 | - // var patch = crawler.Repository.Diff.Compare<Patch>(commitTree, parentTree.); | ||
105 | - // foreach (var item in patch.Where(p => p.OldPath.EndsWith(".c"))) | ||
106 | - // { | ||
107 | - | ||
108 | - // Console.WriteLine(item.Status); | ||
109 | - // Console.WriteLine(item.Path); | ||
110 | - // Console.WriteLine(item.Patch); | ||
111 | - // } | ||
112 | - // Console.ReadLine(); | ||
113 | - | ||
114 | - //} | ||
115 | - | ||
116 | - | ||
117 | - ////Console.WriteLine(patch.Content); | ||
118 | - //Console.ReadLine(); | ||
119 | - | ||
120 | // 템플릿 패턴화 T : VulnAbstractCrawler | 87 | // 템플릿 패턴화 T : VulnAbstractCrawler |
121 | VulnWorker.Run<VulnC>(directory); | 88 | VulnWorker.Run<VulnC>(directory); |
122 | } | 89 | } | ... | ... |
... | @@ -67,6 +67,7 @@ namespace VulnCrawler | ... | @@ -67,6 +67,7 @@ namespace VulnCrawler |
67 | public string FileName { get; set; } = "NULL"; /* FileName */ | 67 | public string FileName { get; set; } = "NULL"; /* FileName */ |
68 | public string FuncName { get; set; } = "NULL"; /* funcName */ | 68 | public string FuncName { get; set; } = "NULL"; /* funcName */ |
69 | public string Url { get; set; } = "NULL"; /* Url */ | 69 | public string Url { get; set; } = "NULL"; /* Url */ |
70 | + public string Product { get; set; } | ||
70 | 71 | ||
71 | } | 72 | } |
72 | //connect | 73 | //connect |
... | @@ -242,7 +243,7 @@ namespace VulnCrawler | ... | @@ -242,7 +243,7 @@ namespace VulnCrawler |
242 | { | 243 | { |
243 | Connection = Conn, | 244 | Connection = Conn, |
244 | //db에 추가 | 245 | //db에 추가 |
245 | - CommandText = "INSERT INTO vulnDetail(type, year, level, userName, cveName, publish_date,update_date, cveDetail,fileName, funcName, url) VALUES(@type, @year, @level, @userName, @cveName, @publish_date,@update_date, @cveDetail,@fileName, @funcName,@url)" | 246 | + CommandText = "INSERT INTO vulnDetail(type, year, level, userName, cveName, publish_date,update_date, cveDetail,fileName, funcName, url, product) VALUES(@type, @year, @level, @userName, @cveName, @publish_date,@update_date, @cveDetail,@fileName, @funcName,@url,@product)" |
246 | }; | 247 | }; |
247 | cmd.Parameters.AddWithValue("@type", $"{vuln.Type}"); | 248 | cmd.Parameters.AddWithValue("@type", $"{vuln.Type}"); |
248 | cmd.Parameters.AddWithValue("@year", $"{vuln.Year}"); | 249 | cmd.Parameters.AddWithValue("@year", $"{vuln.Year}"); |
... | @@ -255,16 +256,16 @@ namespace VulnCrawler | ... | @@ -255,16 +256,16 @@ namespace VulnCrawler |
255 | cmd.Parameters.AddWithValue("@fileName", $"{vuln.FileName}"); | 256 | cmd.Parameters.AddWithValue("@fileName", $"{vuln.FileName}"); |
256 | cmd.Parameters.AddWithValue("@funcName", $"{vuln.FuncName}"); | 257 | cmd.Parameters.AddWithValue("@funcName", $"{vuln.FuncName}"); |
257 | cmd.Parameters.AddWithValue("@url", $"{vuln.Url}"); | 258 | cmd.Parameters.AddWithValue("@url", $"{vuln.Url}"); |
258 | - | 259 | + cmd.Parameters.AddWithValue("@product", $"{vuln.Product}"); |
259 | cmd.ExecuteNonQuery(); | 260 | cmd.ExecuteNonQuery(); |
260 | //콘솔출력용 | 261 | //콘솔출력용 |
261 | sql = "INSERT INTO vulnDetail(type, year, level, userName, cveName, publish_date,update_date, cveDetail,fileName, funcName, url) " + | 262 | sql = "INSERT INTO vulnDetail(type, year, level, userName, cveName, publish_date,update_date, cveDetail,fileName, funcName, url) " + |
262 | $"VALUES({vuln.Type}, {vuln.Year}, {vuln.Level}, {vuln.UserName}, {vuln.CveName},{vuln.Publish_date}, {vuln.Update_date}, {vuln.CveDetail}, {vuln.FileName}, {vuln.FuncName}, {vuln.Url})"; | 263 | $"VALUES({vuln.Type}, {vuln.Year}, {vuln.Level}, {vuln.UserName}, {vuln.CveName},{vuln.Publish_date}, {vuln.Update_date}, {vuln.CveDetail}, {vuln.FileName}, {vuln.FuncName}, {vuln.Url})"; |
263 | - Console.WriteLine(sql); | 264 | + // Console.WriteLine(sql); |
264 | } | 265 | } |
265 | catch (Exception e) | 266 | catch (Exception e) |
266 | { | 267 | { |
267 | - Console.WriteLine(e.ToString()); | 268 | + // Console.WriteLine(e.ToString()); |
268 | string es = e.ToString(); | 269 | string es = e.ToString(); |
269 | if (es.Contains("Connection must be valid and open")) | 270 | if (es.Contains("Connection must be valid and open")) |
270 | { | 271 | { | ... | ... |
This diff is collapsed. Click to expand it.
-
Please register or login to post a comment