Skip to content

Commit af3da21

Browse files
chg: [documentation] Updated documentation.
1 parent dcaada2 commit af3da21

23 files changed

+181
-182
lines changed

content/news/2025-01-10-vulnerability-lookup-2-4-0.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ Discover more about Vulnerability-Lookup and its capabilities here:
4242
https://vulnerability.circl.lu
4343

4444

45-
4645
🙏 Thank you very much to all the contributors and testers!
4746

4847

content/sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ toc: true
77
## Sources and Feeders
88

99
- [CISA Known](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) exploited vulnerability DB (via HTTP).
10-
- NIST NVD CVE importer (via API 2.0).
10+
- NIST NVD CVE importer (via API 2.0), Fraunhofer FKIE NVD.
1111
- [CVEProject - cvelist](https://github.com/CVEProject/cvelist) (via git submodule repository).
1212
- Cloud Security Alliance - [GSD-Database](https://github.com/cloudsecurityalliance/gsd-database/) (via git submodule repository).
1313
- GitHub [Advisory Database](https://github.com/github/advisory-database) (via git submodule repository).

static/documentation/_sources/command-line-interface.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ Update MISP warning lists
122122
123123
$ flask --app website.app update_warninglists
124124
125-
During the update of Vulnerability Lookup, the administrator will be prompted to execute this command.
125+
During the update of Vulnerability-Lookup, the administrator will be prompted to execute this command.
126126

127127

128128
Backup the PostgreSQL database
@@ -132,4 +132,4 @@ Backup the PostgreSQL database
132132
133133
$ flask --app website.app db_backup
134134
135-
This command is executed automatically during the update ot Vulnerability Lookup.
135+
This command is executed automatically during the update ot Vulnerability-Lookup.

static/documentation/_sources/feeds.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Recent vulnerabilities related to a vendor
102102
<title>Most recent entries from cvelistv5</title>
103103
<updated>2024-11-26T08:02:41.668408+00:00</updated>
104104
<author>
105-
<name>Vulnerability Lookup</name>
105+
<name>Vulnerability-Lookup</name>
106106
<email>[email protected]</email>
107107
</author>
108108
<link href="https://vulnerability.circl.lu" rel="alternate"/>
@@ -136,7 +136,7 @@ Recent vulnerabilities linked to the specified vulnerability
136136
<title>Most recent entries from all</title>
137137
<updated>2024-11-26T08:03:09.000211+00:00</updated>
138138
<author>
139-
<name>Vulnerability Lookup</name>
139+
<name>Vulnerability-Lookup</name>
140140
<email>[email protected]</email>
141141
</author>
142142
<link href="https://vulnerability.circl.lu" rel="alternate"/>

static/documentation/_sources/installation.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ In order to compile kvrocks, you will need a few packages:
8181
Clone the source code
8282
---------------------
8383

84-
Clone Vulnerability Lookup with the submodules.
84+
Clone Vulnerability-Lookup with the submodules.
8585

8686
.. code-block:: bash
8787
@@ -275,12 +275,12 @@ Create a file ``/etc/systemd/system/vulnerability-lookup-web.service`` with the
275275
.. code-block:: ini
276276
277277
[Unit]
278-
Description=Vulnerability Lookup webservice
278+
Description=Vulnerability-Lookup webservice
279279
After=network.target
280280
281281
[Service]
282-
User=<system user used to install Vulnerability Lookup>
283-
Group=<group of the user used to install Vulnerability Lookup>
282+
User=<system user used to install Vulnerability-Lookup>
283+
Group=<group of the user used to install Vulnerability-Lookup>
284284
WorkingDirectory=<path to the directory where you cloned the repository>
285285
Environment=PATH="<path-of-the-virtualenv>/bin/:/usr/bin"
286286
ExecStart=/bin/bash -c "run_backend --start ; start_website"

static/documentation/_sources/update.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Updating the CVE Record editor
1818

1919

2020
We are using the `Vulnogram editor <https://github.com/Vulnogram/Vulnogram>`_.
21-
The frontend is directly bundled in a HTML template of Vulnerability Lookup.
21+
The frontend is directly bundled in a HTML template of Vulnerability-Lookup.
2222

2323
If you want to update the bundle you must first generate only the frontend of Vulnogram.
2424
Follow the instructions

static/documentation/_static/documentation_options.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
const DOCUMENTATION_OPTIONS = {
2-
VERSION: '2.1.0',
2+
VERSION: '2.4.0',
33
LANGUAGE: 'en',
44
COLLAPSE_INDEX: false,
55
BUILDER: 'html',

static/documentation/_static/files/swagger.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1387,7 +1387,7 @@
13871387
},
13881388
"vulnerability_lookup_origin": {
13891389
"type": "string",
1390-
"description": "UUID of the Vulnerability Lookup origin instance.",
1390+
"description": "UUID of the Vulnerability-Lookup origin instance.",
13911391
"readOnly": true,
13921392
"default": "1a89b78e-f703-45f3-bb86-59eb712668bd"
13931393
},
@@ -1592,7 +1592,7 @@
15921592
},
15931593
"vulnerability_lookup_origin": {
15941594
"type": "string",
1595-
"description": "UUID of the Vulnerability Lookup origin instance.",
1595+
"description": "UUID of the Vulnerability-Lookup origin instance.",
15961596
"readOnly": true,
15971597
"default": "1a89b78e-f703-45f3-bb86-59eb712668bd"
15981598
},

0 commit comments

Comments
 (0)