cve-bin-tool
cve-bin-tool copied to clipboard
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or...
**New Checker request**: `sudo` **Website**: https://www.sudo.ws/ **CVEs**: https://www.cvedetails.com/vulnerability-list/vendor_id-118/product_id-200/; https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=sudo Note: I was wondering whether making a `sudo` checker is a viable option. Do let me know if it is. I'd...
@param211 suggested in #1081 that one way we could side-step our issues with NVD would be to keep a copy in the repo for testing purposes, so I'm opening this...
New checker request: *libx11* **Website**: x.org **CVEs**: https://www.cvedetails.com/vulnerability-list/vendor_id-88/product_id-9119/X.org-Libx11.html and also https://www.cvedetails.com/product/25241/X-Libx11.html?vendor_id=8216 **Instructions**: [How to add a new checker to the CVE Binary Tool](https://github.com/intel/cve-bin-tool/blob/master/cve_bin_tool/checkers/README.md) (Note: This was filed from the list...
New checker request: *Freetype* **Website**: http://commons.apache.org/ **CVEs**: https://www.cvedetails.com/product/7835/Freetype-Freetype.html?vendor_id=4535 **Instructions**: [How to add a new checker to the CVE Binary Tool](https://github.com/intel/cve-bin-tool/blob/master/cve_bin_tool/checkers/README.md) (Note: This was filed from the list in #709)
New checker request: *Libxkbcommon* **Website**: https://xkbcommon.org/ **CVEs**: https://www.cvedetails.com/vulnerability-list/vendor_id-19208/product_id-49883/version_id-259877/Xkbcommon-Libxkbcommon-0.8.1.html **Instructions**: [How to add a new checker to the CVE Binary Tool](https://github.com/intel/cve-bin-tool/blob/master/cve_bin_tool/checkers/README.md) (Note: This was filed from the list in #709)
During our GSoC meeting this week, I mentioned to @SaurabhK122 that we had an older wishlist, but I hadn't updated it lately to see how much of it we covered....
New checker request: *libevent* (Taken from the wishllist in #709) **Source code**: https://github.com/libevent/libevent **CVEs**: https://www.cvedetails.com/vulnerability-list/vendor_id-15590/product_id-32303/Libevent-Project-Libevent.html **Instructions**: [How to add a new checker to the CVE Binary Tool](https://github.com/intel/cve-bin-tool/blob/master/cve_bin_tool/checkers/README.md) You can also...
I'm currently using vscode's `markdownlint` as my document linter for markdown files, but as you may have noticed, I haven't been super aggressive about that. I'm wondering if I should...
According to the [affected versions of CVE-2009-0590](https://nvd.nist.gov/vuln/detail/CVE-2009-0590), the last entry at the end says "Up to (including) 0.9.8j", but the imported data into the `cve_range` table has a first entry...