cve_pull is a tool to pull Common Vulnerabilities and Exposures (CVE) from the National Vulnerability Database (NVD) without the use of the NVD API
git clone https://github.com/ajread4/cve_pull.git
cd cve_pull
pip3 install -r requirements.txt
$ python3 cve_pull.py -h
usage: cve_pull.py [-h] [-c cve] [-f cve_file] [-d]
cve_pull - a tool to pull information regarding a CVE or multiple CVEs from the National Vulnerability Database (NVD).
options:
-h, --help show this help message and exit
-c cve, --cve cve specify the CVE #
-f cve_file, --file cve_file
specify a CSV with multiple CVE #s in a single column
-d, --description return the description of the CVE
- Return the CVSS for CVE-2020-0764.
$ python3 cve_pull.py -c CVE-2020-0764
CVSS2 Score: 4.6 MEDIUM
CVSS3 Score: 7.8 HIGH
- Return the CVSS and description of CVE-2021-45046.
$ python3 cve_pull.py -c CVE-2021-45046 -d
CVSS2 Score: 5.1 MEDIUM
CVSS3 Score: 9.0 CRITICAL
Description: It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
- Return the CVSS for each CVE within an input file.
$ python3 cve_pull.py -f /home/ajread/code/KEV_CVEs.csv
CVE: CVE-2004-2761
5.0 MEDIUM
No CVSSv3 Score
CVE: CVE-2012-1823
7.5 HIGH
No CVSSv3 Score
CVE: CVE-2013-0640
9.3 HIGH
No CVSSv3 Score
CVE: CVE-2013-0641
9.3 HIGH
No CVSSv3 Score
CVE: CVE-2013-1609
6.8 MEDIUM
No CVSSv3 Scores
- Return the Published Date and scores for a CVE.
$ python3 cve_pull.py -c CVE-2019-0708 -t
CVSS2 Score: 10.0 HIGH
CVSS3 Score: 9.8 CRITICAL
Published Date: 05/16/2019
All code was written by me, AJ Read, with inspiration from MachineThing's cve_lookup.
- Twitter: ajread3
- Github: ajread4
- LinkedIn: Austin Read