!C99Shell v.2.1 [PHP 7 Update] [1.12.2019]!

Software: Apache. PHP/5.3.29 

uname -a: Linux tardis23.nocplanet.net 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024
x86_64
 

 

Safe-mode: OFF (not secure)

/opt/imunify360/venv/lib/python3.11/site-packages/imav/migrations/   drwxr-xr-x
Free 978.86 GB of 1859.98 GB (52.63%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     016_add_vulnerability_hit_table.py (2.48 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import peewee as pw

from defence360agent.model.simplification import FilenameField


def migrate(migrator, database, fake=False, **kwargs):
    MalwareScan = migrator.orm["malware_scans"]

    class VulnerabilityHit(pw.Model):
        """Represents a vulnerable file."""

        class Meta:
            db_table = "vulnerability_hits"

        #: An id of a scan, unique per server.
        id = pw.PrimaryKeyField()
        #: A reference to :class:`MalwareScan`.
        scanid = pw.ForeignKeyField(
            MalwareScan,
            null=False,
            related_name="vulnerabilities",
            on_delete="CASCADE",
        )
        #: The owner of the file.
        owner = pw.CharField(null=False)
        #: The user a file belongs to (is in user's home but owned by another user)
        user = pw.CharField(null=False)
        #: The original path to the file.
        orig_file = FilenameField(null=False)
        #: The type of infection (signature).
        type = pw.CharField(null=False)
        #: The hash of the files as provided by AI-BOLIT.
        hash = pw.CharField(null=True)
        #: The size of the file.
        size = pw.CharField(null=True)
        #: The exact timestamp when AI-BOLIT has detected the file.
        timestamp = pw.FloatField(null=True)
        #: The current status of the file.
        #: Must be one of :class:`.VulnerabilityHitStatus`.
        status = pw.CharField(default="vulnerable")
        #: Timestamp when the file was last patched.
        patched_at = pw.FloatField(null=True)

    migrator.create_model(VulnerabilityHit)


def rollback(migrator, database, fake=False, **kwargs):
    VulnerabilityHit = migrator.orm["vulnerability_hits"]
    migrator.remove_model(VulnerabilityHit)

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v.2.1 [PHP 7 Update] [1.12.2019] maintained by KaizenLouie and updated by cermmik | C99Shell Github (MySQL update) | Generation time: 0.0828 ]--