Skip to content

feat: CVE query wildcard vendor entries #4730

Open
@m-1-k-3

Description

@m-1-k-3

Description

Hi cve-bin-tool team. We currently evaluate the integration of cve-bin-tool into EMBA. In EMBA we query the CVE data via grep queries. These include sometimes regular expressions for vendor entries. like cpe:${CPE_VERSION}:[aoh]:.*${lVERSION_SEARCHx}" "${NVD_DIR}"
The simplest possibility to integrate csv-bin-tool I have found is via csv import like python3 ./cve_bin_tool/cli.py -i ~/Downloads/test.csv --offline

In such a case we could prepare test.csv with some entries like linux_kernel,linux,2.6.23

But in the mentioned use-case of linux_kernel,,2.6.23 this approach fails. Is there already a mechanism to perform queries with wildcard vendors that I have missed? Probably we could enter some key-word as vendor to bypass the vendor search?

Why?

cve-bin-tool is much faster in CVE queries as the current EMBA approach. Probably we could integrate it into EMBA as the main CVE query engine.

Environment context (optional)

Currently it is for evaluating a possible integration into EMBA. In the future it could be integrated as the central CVE engine for EMBA. EMBA is providing a Kali Linux based docker base image where we could integrate cve-bin-tool.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or requesthackathonIssues for folk participating in the Open Ecosystems hackathon

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions