.TH CVEDB 1 "January 2025" "cvedb-py 0.1.0" "User Commands" .SH NAME cvedb \- CLI client for Shodan's CVEDB API .SH SYNOPSIS .B cvedb .I command .RI [ options ] .SH DESCRIPTION .B cvedb is a command-line client for Shodan's CVEDB API, providing fast vulnerability lookups using CVE IDs and CPE 2.3 identifiers. Data is sourced from the National Vulnerability Database (NVD) and updated daily. .SH COMMANDS .TP .BI "cve " CVE-ID Look up a specific CVE by its identifier (e.g., CVE-2021-44228). .TP .B cves Search CVEs by product name or CPE 2.3 identifier. .TP .BI "cpes " PRODUCT List CPE 2.3 identifiers matching a product name. .SH OPTIONS .SS "Global Options" .TP .BR \-h ", " \-\-help Show help message and exit. .TP .BR \-f ", " \-\-format " " \fIFORMAT\fR Output format: \fBtable\fR (default for TTY), \fBtsv\fR (default for pipes), or \fBjson\fR. .SS "cve Options" .TP .BR \-f ", " \-\-format " " \fIFORMAT\fR Output format. .SS "cves Options" .TP .BR \-p ", " \-\-product " " \fINAME\fR Product name to search. .TP .BR \-c ", " \-\-cpe " " \fICPE23\fR CPE 2.3 identifier to search. .TP .BR \-k ", " \-\-kev Only show CISA Known Exploited Vulnerabilities. .TP .BR \-e ", " \-\-sort\-epss Sort results by EPSS score (descending). .TP .BR \-s ", " \-\-start " " \fIDATE\fR Filter by start date (YYYY-MM-DD). .TP .BI \-\-end " DATE" Filter by end date (YYYY-MM-DD). .TP .BR \-l ", " \-\-limit " " \fIN\fR Maximum number of results (default: 25). .TP .BR \-L ", " \-\-no\-limit Fetch all results without limit. .TP .BI \-\-skip " N" Skip first N results. .TP .B \-\-count Only show the count of matching results. .SS "cpes Options" .TP .BR \-l ", " \-\-limit " " \fIN\fR Maximum number of results (default: 25). .TP .BR \-L ", " \-\-no\-limit Fetch all results without limit. .TP .BI \-\-skip " N" Skip first N results. .TP .B \-\-count Only show the count of matching results. .SH OUTPUT FORMATS .TP .B table Rich formatted table with colors and styling. Default when stdout is a TTY. .TP .B tsv Tab-separated values with header row. Default when stdout is piped. .TP .B json JSON output, suitable for processing with jq. .SH EXAMPLES Look up Log4Shell vulnerability: .PP .RS .nf cvedb cve CVE-2021-44228 .fi .RE .PP Find nginx vulnerabilities in CISA KEV, sorted by EPSS: .PP .RS .nf cvedb cves -p nginx -k -e .fi .RE .PP Search by specific CPE: .PP .RS .nf cvedb cves -c "cpe:2.3:a:apache:http_server:2.4.49" .fi .RE .PP Count WordPress CVEs from 2024: .PP .RS .nf cvedb cves -p wordpress -s 2024-01-01 --end 2024-12-31 --count .fi .RE .PP Export all OpenSSL CVEs to JSON: .PP .RS .nf cvedb cves -p openssl -L -f json > openssl.json .fi .RE .PP List CPEs for a product: .PP .RS .nf cvedb cpes woocommerce .fi .RE .SH EXIT STATUS .TP .B 0 Success. .TP .B 1 Error (API error, invalid arguments, etc.). .SH API The CVEDB API is provided by Shodan and is free for non-commercial use. Data is sourced from NVD and updated daily at midnight UTC. No authentication is required. .PP API documentation: https://cvedb.shodan.io/docs .SH SEE ALSO .BR jq (1), .BR curl (1) .PP https://cvedb.shodan.io .SH AUTHORS Generated with Claude Code.