Updated README.

This commit is contained in:
Cédric Bonhomme 2020-01-03 17:39:56 +01:00
parent dfa15c119d
commit fe4a656412
No known key found for this signature in database
GPG key ID: A1CB94DE57B7A70D
3 changed files with 2 additions and 4 deletions

View file

@ -10,9 +10,7 @@ added automatically in the output.
# Requirements # Requirements
- Python 3.6 - jq (sudo apt install jq)
- GitPython
- langdetect
# Installation # Installation
@ -66,7 +64,7 @@ git-vuln-finder comes with 3 default patterns which can be selected to find the
## A sample partial output from Curl git repository ## A sample partial output from Curl git repository
~~~bash ~~~bash
$ git-vuln-finder -r /home/adulau/git/curl | jq . $ git-vuln-finder -r ~/git/curl | jq .
... ...
"6df916d751e72fc9a1febc07bb59c4ddd886c043": { "6df916d751e72fc9a1febc07bb59c4ddd886c043": {
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n", "message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",