SkillAgentSearch skills...

Searchcve

Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.

Install / Use

/learn @stanfrbd/Searchcve
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

searchcve

Web scrapping tool written in python3, using regex, to get CVEs, Source and URLs.

GitHub stars GitHub issues License

Features

  • Web scrapping tool written in python3, using regex, to get CVEs, Source and URLs.
  • Generates a CSV file in the current directory.
  • Uses the NIST API v2 to get info.

Getting started

Install dependencies

  • requests, bs4 (or beautifulsoup4) and prettytable must be installed.

You might want to create a venv before installing the dependencies.

pip install -r requirements.txt

Proxy

If you need to use a proxy, then write use the -p or --proxy argument.

python3 searchcve.py -u "https://us-cert.cisa.gov/ncas/alerts/aa21-209a" -p "http://127.0.0.1:9000"

Or you can set the proxy in the code of the script.

proxy = "http://127.0.0.1:9000"

Example of usage

python3 searchcve.py -u https://us-cert.cisa.gov/ncas/alerts/aa21-209a
python3 searchcve.py -u https://www.kennasecurity.com/blog/top-vulnerabilities-of-the-decade/
python3 searchcve.py --url https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/
python3 searchcve.py --url https://nvd.nist.gov/ 

Development on Linux

Just in Bash (Ubuntu 18+):

chmod +x developer.sh
./developer.sh

On Linux

chmod +x searchcve.py

./searchcve.py -u https://us-cert.cisa.gov/ncas/alerts/aa21-209a
./searchcve.py --url https://nvd.nist.gov/ 

image

Other arguments

Command line tool that uses the NIST API to get resources.

usage: searchcve.py [-h] [-c CVE] [-k KEYWORD] [-u URL] [-i INPUT_FILE] [-p PROXY]

options:
  -h, --help            show this help message and exit
  -c CVE, --cve CVE     Choose CVE e.g. "CVE-2020-1472"
  -k KEYWORD, --keyword KEYWORD
                        Choose keyword e.g. "microsoft" -- it will give the 20 latest vulnerabilities and export to
                        csv in the current directory
  -u URL, --url URL     Choose URL e.g. "https://nvd.nist.gov/" -- it will export to csv in the current directory
  -i INPUT_FILE, --input-file INPUT_FILE
                        Choose the path to input file containing CVEs or URLs e.g. "test.csv" -- it will export to csv
                        in the current directory
  -p PROXY, --proxy PROXY
                        Choose proxy e.g. "http://127.0.0.1:9000"
python3 searchcve.py -c CVE-2020-1472

image

python3 searchcve.py -k microsoft

image

python3 searchcve.py -i cves.csv

image

Related Skills

View on GitHub
GitHub Stars41
CategoryData
Updated6mo ago
Forks7

Languages

Python

Security Score

82/100

Audited on Sep 25, 2025

No findings