Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Tool to pull information from the National Vulnerability Database (NVD) Common Vulnerabilities and Exposures (CVEs)

NotificationsYou must be signed in to change notification settings

ajread4/cve_pull

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cve_pull is a tool to pull Common Vulnerabilities and Exposures (CVE) from theNational Vulnerability Database (NVD) without the use of theNVD API

Install

git clone https://github.com/ajread4/cve_pull.gitcd cve_pullpip3 install -r requirements.txt

Usage

$ python3 cve_pull.py -husage: cve_pull.py [-h] [-c  cve] [-f  cve_file] [-d]cve_pull - a tool to pull information regarding a CVE or multiple CVEs from the National Vulnerability Database (NVD).options:  -h, --help            show this help message and exit  -c  cve, --cve cve    specify the CVE #  -f  cve_file, --file cve_file                        specify a CSV with multiple CVE #s in a single column  -d, --description     return the description of the CVE

Example

  1. Return the CVSS for CVE-2020-0764.
$ python3 cve_pull.py -c CVE-2020-0764CVSS2 Score: 4.6 MEDIUMCVSS3 Score: 7.8 HIGH
  1. Return the CVSS and description of CVE-2021-45046.
$ python3 cve_pull.py -c CVE-2021-45046 -dCVSS2 Score: 5.1 MEDIUMCVSS3 Score: 9.0 CRITICALDescription: It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
  1. Return the CVSS for each CVE within an input file.
$ python3 cve_pull.py -f /home/ajread/code/KEV_CVEs.csvCVE: CVE-2004-27615.0 MEDIUMNo CVSSv3 ScoreCVE: CVE-2012-18237.5 HIGHNo CVSSv3 ScoreCVE: CVE-2013-06409.3 HIGHNo CVSSv3 ScoreCVE: CVE-2013-06419.3 HIGHNo CVSSv3 ScoreCVE: CVE-2013-16096.8 MEDIUMNo CVSSv3 Scores
  1. Return the Published Date and scores for a CVE.
$ python3 cve_pull.py -c CVE-2019-0708 -tCVSS2 Score: 10.0 HIGHCVSS3 Score: 9.8 CRITICALPublished Date: 05/16/2019

Author

All code was written by me, AJ Read, with inspiration fromMachineThing'scve_lookup.

About

Tool to pull information from the National Vulnerability Database (NVD) Common Vulnerabilities and Exposures (CVEs)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp