Add SBOM, symbols, traces, and VEX files for CVE-2022-21661 SQLi case
Some checks failed
Docs CI / lint-and-preview (push) Has been cancelled
Some checks failed
Docs CI / lint-and-preview (push) Has been cancelled
- Created CycloneDX and SPDX SBOM files for both reachable and unreachable images. - Added symbols.json detailing function entry and sink points in the WordPress code. - Included runtime traces for function calls in both reachable and unreachable scenarios. - Developed OpenVEX files indicating vulnerability status and justification for both cases. - Updated README for evaluator harness to guide integration with scanner output.
This commit is contained in:
@@ -0,0 +1,19 @@
|
||||
namespace StellaOps.Cryptography.Plugin.Pkcs11Gost;
|
||||
|
||||
internal sealed class Pkcs11SessionOptions
|
||||
{
|
||||
public string LibraryPath { get; init; } = string.Empty;
|
||||
|
||||
public string? SlotId { get; init; }
|
||||
|
||||
public string? TokenLabel { get; init; }
|
||||
|
||||
public string? UserPin { get; init; }
|
||||
|
||||
public string? UserPinEnvironmentVariable { get; init; }
|
||||
|
||||
public string? PrivateKeyLabel { get; init; }
|
||||
|
||||
public string? PublicKeyLabel { get; init; }
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user