From fbc4d46962c72a7a77833efd5779b2b8c537f614 Mon Sep 17 00:00:00 2001 From: Jeremy Long Date: Sun, 20 Sep 2015 06:39:55 -0400 Subject: [PATCH] updated language list to include php --- src/site/markdown/index.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/site/markdown/index.md b/src/site/markdown/index.md index ac5e186e8..fb1931477 100644 --- a/src/site/markdown/index.md +++ b/src/site/markdown/index.md @@ -2,11 +2,11 @@ About ==================== OWASP dependency-check is an open source solution the OWASP Top 10 2013 entry: [A9 - Using Components with Known Vulnerabilities](https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities). -Dependency-check can currently be used to scan Java, .NET, Python, Ruby and +Dependency-check can currently be used to scan Java, .NET, Python, Ruby (gemspec), PHP (composer), and Node.js applications (and their dependent libraries) to identify known vulnerable components. In addition, Dependency-check can be used to scan some -source code, including OpenSSL source code and source code for projects that -use [Autoconf](https://www.gnu.org/software/autoconf/) or +source code, including OpenSSL source code and projects that use +[Autoconf](https://www.gnu.org/software/autoconf/) or [CMake](http://www.cmake.org/overview/). The problem with using known vulnerable components was covered in a paper by