Skip to content

This script looks up CVE numbers you receive from nessus/qualys output and checks them against the Microsoft API to retrieve information such as if there has been exploitation or public details.

License

Notifications You must be signed in to change notification settings

CraigDonkin/Microsoft-CVE-Lookup

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Microsoft-CVE-Lookup

This script looks up CVE numbers you receive from nessus/qualys output and checks them against the Microsoft API to retrieve information such as if there has been exploitation or public details.

Help

Retrieve information for a CVE from Microsoft API.

  cve_number            CVE number to retrieve information for, example
                        CVE-2024-1234.

options:
  -h, --help            show this help message and exit
  -f FILE, --file FILE  Read CVE numbers from a file. One CVE number per line
                        in a format like CVE-2024-1234.
  -only-exploited       This will only return output if the value of exploited
                        is yes.
  -only-public          This will only return output only if the value of
                        publically disclosed is Yes.

Example output

CVE-2020-1446:
Microsoft Word Remote Code Execution Vulnerability
CVSS Base Score: None
Publicly Disclosed: No
Exploited: No
CVE-2023-36033
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS Base Score: 7.8
Publicly Disclosed: Yes
Exploited: Yes

About

This script looks up CVE numbers you receive from nessus/qualys output and checks them against the Microsoft API to retrieve information such as if there has been exploitation or public details.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages