cve-bin-tool icon indicating copy to clipboard operation
cve-bin-tool copied to clipboard

feat: CVE query wildcard vendor entries

Open m-1-k-3 opened this issue 9 months ago • 3 comments

Description

Hi cve-bin-tool team. We currently evaluate the integration of cve-bin-tool into EMBA. In EMBA we query the CVE data via grep queries. These include sometimes regular expressions for vendor entries. like cpe:${CPE_VERSION}:[aoh]:.*${lVERSION_SEARCHx}" "${NVD_DIR}" The simplest possibility to integrate csv-bin-tool I have found is via csv import like python3 ./cve_bin_tool/cli.py -i ~/Downloads/test.csv --offline

In such a case we could prepare test.csv with some entries like linux_kernel,linux,2.6.23

But in the mentioned use-case of linux_kernel,,2.6.23 this approach fails. Is there already a mechanism to perform queries with wildcard vendors that I have missed? Probably we could enter some key-word as vendor to bypass the vendor search?

Why?

cve-bin-tool is much faster in CVE queries as the current EMBA approach. Probably we could integrate it into EMBA as the main CVE query engine.

Environment context (optional)

Currently it is for evaluating a possible integration into EMBA. In the future it could be integrated as the central CVE engine for EMBA. EMBA is providing a Kali Linux based docker base image where we could integrate cve-bin-tool.

m-1-k-3 avatar Jan 29 '25 13:01 m-1-k-3