You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+24-2Lines changed: 24 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ The CVE Binary Tool is a free, open source tool to help you find known vulnerabi
15
15
The tool has two main modes of operation:
16
16
17
17
1. A binary scanner which helps you determine which packages may have been included as part of a piece of software. There are around 100 checkers which focus on common, vulnerable open source components such as openssl, libpng, libxml2 and expat.
18
-
2. Tools for scanning known component lists in various formats, including .csv, several linux distribution package lists, and several Software Bill of Materials (SBOM) formats.
18
+
2. Tools for scanning known component lists in various formats, including .csv, several linux distribution package lists, language specific package scanners and several Software Bill of Materials (SBOM) formats.
19
19
20
20
It is intended to be used as part of your continuous integration system to enable regular vulnerability scanning and give you early warning of known issues in your supply chain.
21
21
@@ -24,7 +24,7 @@ For more details, see our [documentation](https://cve-bin-tool.readthedocs.io/en
A number of checkers are available for finding vulnerable components in specific language packages.
224
+
225
+
### Java
226
+
227
+
The scanner examines the `pom.xml` file within a Java package archive to identify Java components. The package names and versions within the archive are used to search the database for vulnerabilities.
228
+
229
+
JAR, WAR and EAR archives are supported.
230
+
231
+
### Python
232
+
233
+
The scanner examines the `PKG-INFO` and `METADATA` files for an installed Python package to extract the component name and version which
234
+
are used to search the database for vulnerabilities.
235
+
236
+
The tool supports the scanning of the contents of any Wheel package files (indicated with a file extension of .whl) and egg package files (indicated with a file extension of .egg).
237
+
238
+
The `--package-list` option can be used with a Python dependencies file `requirements.txt` to find the vulnerabilities in the list of components.
239
+
218
240
## Limitations
219
241
220
242
This scanner does not attempt to exploit issues or examine the code in greater
0 commit comments