aboutsummaryrefslogtreecommitdiffstats
path: root/cvedb.1
blob: d96c10763cdf22291c6d0dc49696642a772c6cf8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
.TH CVEDB 1 "January 2025" "cvedb-py 0.1.0" "User Commands"
.SH NAME
cvedb \- CLI client for Shodan's CVEDB API
.SH SYNOPSIS
.B cvedb
.I command
.RI [ options ]
.SH DESCRIPTION
.B cvedb
is a command-line client for Shodan's CVEDB API, providing fast vulnerability
lookups using CVE IDs and CPE 2.3 identifiers. Data is sourced from the
National Vulnerability Database (NVD) and updated daily.
.SH COMMANDS
.TP
.BI "cve " CVE-ID
Look up a specific CVE by its identifier (e.g., CVE-2021-44228).
.TP
.B cves
Search CVEs by product name or CPE 2.3 identifier.
.TP
.BI "cpes " PRODUCT
List CPE 2.3 identifiers matching a product name.
.SH OPTIONS
.SS "Global Options"
.TP
.BR \-h ", " \-\-help
Show help message and exit.
.TP
.BR \-f ", " \-\-format " " \fIFORMAT\fR
Output format: \fBtable\fR (default for TTY), \fBtsv\fR (default for pipes),
or \fBjson\fR.
.SS "cve Options"
.TP
.BR \-f ", " \-\-format " " \fIFORMAT\fR
Output format.
.SS "cves Options"
.TP
.BR \-p ", " \-\-product " " \fINAME\fR
Product name to search.
.TP
.BR \-c ", " \-\-cpe " " \fICPE23\fR
CPE 2.3 identifier to search.
.TP
.BR \-k ", " \-\-kev
Only show CISA Known Exploited Vulnerabilities.
.TP
.BR \-e ", " \-\-sort\-epss
Sort results by EPSS score (descending).
.TP
.BR \-s ", " \-\-start " " \fIDATE\fR
Filter by start date (YYYY-MM-DD).
.TP
.BI \-\-end " DATE"
Filter by end date (YYYY-MM-DD).
.TP
.BR \-l ", " \-\-limit " " \fIN\fR
Maximum number of results (default: 25).
.TP
.BR \-L ", " \-\-no\-limit
Fetch all results without limit.
.TP
.BI \-\-skip " N"
Skip first N results.
.TP
.B \-\-count
Only show the count of matching results.
.SS "cpes Options"
.TP
.BR \-l ", " \-\-limit " " \fIN\fR
Maximum number of results (default: 25).
.TP
.BR \-L ", " \-\-no\-limit
Fetch all results without limit.
.TP
.BI \-\-skip " N"
Skip first N results.
.TP
.B \-\-count
Only show the count of matching results.
.SH OUTPUT FORMATS
.TP
.B table
Rich formatted table with colors and styling. Default when stdout is a TTY.
.TP
.B tsv
Tab-separated values with header row. Default when stdout is piped.
.TP
.B json
JSON output, suitable for processing with jq.
.SH EXAMPLES
Look up Log4Shell vulnerability:
.PP
.RS
.nf
cvedb cve CVE-2021-44228
.fi
.RE
.PP
Find nginx vulnerabilities in CISA KEV, sorted by EPSS:
.PP
.RS
.nf
cvedb cves -p nginx -k -e
.fi
.RE
.PP
Search by specific CPE:
.PP
.RS
.nf
cvedb cves -c "cpe:2.3:a:apache:http_server:2.4.49"
.fi
.RE
.PP
Count WordPress CVEs from 2024:
.PP
.RS
.nf
cvedb cves -p wordpress -s 2024-01-01 --end 2024-12-31 --count
.fi
.RE
.PP
Export all OpenSSL CVEs to JSON:
.PP
.RS
.nf
cvedb cves -p openssl -L -f json > openssl.json
.fi
.RE
.PP
List CPEs for a product:
.PP
.RS
.nf
cvedb cpes woocommerce
.fi
.RE
.SH EXIT STATUS
.TP
.B 0
Success.
.TP
.B 1
Error (API error, invalid arguments, etc.).
.SH API
The CVEDB API is provided by Shodan and is free for non-commercial use.
Data is sourced from NVD and updated daily at midnight UTC.
No authentication is required.
.PP
API documentation: https://cvedb.shodan.io/docs
.SH SEE ALSO
.BR jq (1),
.BR curl (1)
.PP
https://cvedb.shodan.io
.SH AUTHORS
Generated with Claude Code.