mirror of
https://github.com/cve-search/git-vuln-finder.git
synced 2024-11-26 00:37:19 +00:00
Updated README.
This commit is contained in:
parent
dfa15c119d
commit
fe4a656412
3 changed files with 2 additions and 4 deletions
|
@ -10,9 +10,7 @@ added automatically in the output.
|
||||||
|
|
||||||
# Requirements
|
# Requirements
|
||||||
|
|
||||||
- Python 3.6
|
- jq (sudo apt install jq)
|
||||||
- GitPython
|
|
||||||
- langdetect
|
|
||||||
|
|
||||||
|
|
||||||
# Installation
|
# Installation
|
||||||
|
@ -66,7 +64,7 @@ git-vuln-finder comes with 3 default patterns which can be selected to find the
|
||||||
## A sample partial output from Curl git repository
|
## A sample partial output from Curl git repository
|
||||||
|
|
||||||
~~~bash
|
~~~bash
|
||||||
$ git-vuln-finder -r /home/adulau/git/curl | jq .
|
$ git-vuln-finder -r ~/git/curl | jq .
|
||||||
...
|
...
|
||||||
"6df916d751e72fc9a1febc07bb59c4ddd886c043": {
|
"6df916d751e72fc9a1febc07bb59c4ddd886c043": {
|
||||||
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",
|
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",
|
||||||
|
|
Binary file not shown.
Binary file not shown.
Loading…
Reference in a new issue