This script fetches and displays details about specified CVE (Common Vulnerabilities and Exposures) IDs using the CIRCL CVE API. It also checks for available exploits related to the CVE IDs using searchsploit
and nomi-sec.
Ensure the following tools are installed on your system:
curl
jq
searchsploit
You can install them using the following commands:
sudo apt-get install curl jq exploitdb
or you can use the following commands:
git clone https://gitlab.com/exploit-database/exploitdb.git
Make sure to set the appropriate permissions to execute the script:
chmod +x cve_details_fetcher.sh
--cve <CVE ID>
: Specify a single CVE ID to fetch details for.--list <CVE list file>
: Specify a file containing a list of CVE IDs, one per line.--ref <number of references to show>
: (Optional) Specify the number of references to display. Default is 3.--e
: (Optional) Include this flag to show exploits related to the CVE from the CVE API andsearchsploit
.
- Fetch details for a single CVE ID:
./cve_details_fetcher.sh --cve 2022-0001
- Fetch details for a single CVE ID and show related exploits:
./cve_details_fetcher.sh --cve 2022-0001 --e
- Fetch details for a list of CVE IDs from a file:
./cve_details_fetcher.sh --list cve_list.txt
- Fetch details for a list of CVE IDs from a file and show related exploits:
./cve_details_fetcher.sh --list cve_list.txt --e
To fetch and display details for multiple CVE IDs from a file:
./cve_details_fetcher.sh --list cve_list.txt --ref 5 --e
- Option to show only exploit.
- Ensure
searchsploit
is correctly configured and its path is added to yourPATH
environment variable. - Adjust the script and commands as needed based on your environment and requirements.
Copyright © 2022-present bortotti Org