logo

cve-client

CLI-based client / toolbox for CVE.org git clone https://anongit.hacktivis.me/git/cve-client.git/

README.md (1300B)


  1. # CVE-Client: CLI-based client / toolbox for CVE.org
  2. Because why would you ever rely on someone else's clobbered together JavaScript code to get important security information.
  3. ## Dependencies
  4. - Perl 5
  5. - Getopt::Std (should be included in your perl)
  6. - JSON::MaybeXS (should be included in your perl)
  7. - LWP::UserAgent (should be included in your perl)
  8. - LWP::Protocol::https
  9. ## Example
  10. ```
  11. % cve-client CVE-2021-35197
  12. CVE ID: CVE-2021-35197
  13. Description Language: eng
  14. Description:
  15. In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a "sitewide block" applied, it is able to still "purge" pages through the MediaWiki Action API (which a "sitewide block" should have prevented).
  16. Reference Source: MISC
  17. - Name: https://phabricator.wikimedia.org/T280226
  18. - URL: https://phabricator.wikimedia.org/T280226
  19. Reference Source: CONFIRM
  20. - Name: https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/
  21. - URL: https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/
  22. Reference Source: GENTOO
  23. - Name: GLSA-202107-40
  24. - URL: https://security.gentoo.org/glsa/202107-40
  25. ```