Query the National Vulnerability Database from your terminal โ fast, beautiful, and scriptable.
๐ก CVE-CLI NVD-Powered Vulnerability Intelligence
โญโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฎ
โ CVE-2021-44228 โ
โ ๐ด CRITICAL 10.0/10 โ
โ โโโโโโโโโโโโโโโโโโโโ CVSS 3.1 ยท Network ยท Low Complexity โ
โฐโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
๐ Description
Apache Log4j2 2.0-beta9 through 2.14.1 JNDI features used in
configuration, log messages, and parameters do not protect against
attacker-controlled LDAP and other JNDI related endpoints...
๐ References (12)
https://logging.apache.org/log4j/2.x/security.html
https://github.com/advisories/GHSA-jfh8-c2jp-5-qrq
...
- ๐ Lookup any CVE by ID with full CVSS detail
- ๐ Search by keyword, product, or vendor
- ๐ Recent โ browse CVEs from the last N days
- ๐ Stats โ severity breakdown chart for any topic
- ๐ Watchlist โ save CVEs locally to track
- ๐ Export โ HTML reports + JSON output
- ๐ Beautiful terminal output with Rich
- ๐ Optional NVD API key for higher rate limits
From PyPI (coming soon)
pip install cve-cliFrom source
git clone https://github.com/AswinMathew2004/cve-cli
cd cve-cli
pip install -r requirements.txt
python cve_cli.py --helpcve-cli lookup CVE-2021-44228
cve-cli lookup CVE-2023-44487 # HTTP/2 Rapid Reset
cve-cli lookup CVE-2014-0160 # Heartbleedcve-cli search --keyword log4j
cve-cli search --product nginx --severity HIGH
cve-cli search --vendor microsoft --days 30 --limit 50
cve-cli search --keyword wordpress --severity CRITICAL --export report.htmlcve-cli recent # last 7 days
cve-cli recent --days 30
cve-cli recent --severity CRITICAL --export critical.htmlcve-cli stats --keyword apache
cve-cli stats --keyword dockercve-cli watch --add CVE-2021-44228
cve-cli watch --add CVE-2023-44487
cve-cli watch --list # fetch & display all watched CVEs
cve-cli watch --remove CVE-2021-44228# HTML report (shareable)
cve-cli search --keyword openssl --export openssl_report.html
# JSON for scripting / SIEM integration
cve-cli search --keyword nginx --json-out nginx_cves.jsonWithout a key you get 5 requests/30 seconds. With a free NVD API key you get 50 requests/30 seconds.
Get your free key at: https://nvd.nist.gov/developers/request-an-api-key
# Set via environment variable
export NVD_API_KEY=your-key-here
# Or pass directly
cve-cli --api-key your-key-here lookup CVE-2021-44228CVE-CLI outputs JSON so you can pipe it into other tools:
# Save to JSON and process with jq
cve-cli search --keyword apache --json-out cves.json
cat cves.json | jq '[.[] | select(.cvss.score >= 9.0)]'
# Daily critical CVE alert (add to cron)
cve-cli recent --days 1 --severity CRITICAL --export /var/www/html/daily_cves.html- PyPI release (
pip install cve-cli) - EPSS score integration
- Slack / Discord webhook alerts
- SBOM / requirements.txt scanning
- GitHub Actions integration
PRs are welcome! Please open an issue first to discuss what you'd like to change.
- Fork the repo
- Create a feature branch (
git checkout -b feature/webhook-alerts) - Commit your changes
- Open a PR to AswinMathew2004/cve-cli
MIT ยฉ Aswin Mathew
Data source: National Vulnerability Database (NVD) by NIST. This tool is not affiliated with or endorsed by NIST. Made with โค๏ธ by Aswin Mathew โ GitHub