From fdd918d97027dfd5159e2a42104cc9eff6766845 Mon Sep 17 00:00:00 2001 From: Kota Kanbe Date: Sat, 16 Apr 2016 22:52:02 +0900 Subject: [PATCH] Update README.md --- README.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index fd83eac9..9884281b 100644 --- a/README.md +++ b/README.md @@ -239,7 +239,7 @@ $ vuls tui ![Vuls-Architecture](img/vuls-architecture.png) -## go-cve-dictinary +## [go-cve-dictinary](https://github.com/kotakanbe/go-cve-dictionary) - Fetch vulnerability information from NVD, JVN(Japanese), then insert into SQLite. ## Vuls @@ -530,6 +530,9 @@ It is possible to detect vulnerabilities something you compiled by yourself, the - [NVD: Search Common Platform Enumerations (CPE)](https://web.nvd.nist.gov/view/cpe/search) **Check CPE Naming Format: 2.2** + - [go-cpe-dictionary](https://github.com/kotakanbe/go-cpe-dictionary) is a good choice for geeks. + You can search a CPE name by the application name incremenally. + - Configuration To detect the vulnerbility of Ruby on Rails v4.2.1, cpeNames needs to be set in the servers section. ```