vuln-checker


Namevuln-checker JSON
Version 0.5.5 PyPI version JSON
download
home_pageNone
SummaryCLI tool to fetch CVEs using NVD Feeds
upload_time2025-10-21 14:42:50
maintainerNone
docs_urlNone
authorNone
requires_python>=3.7
licenseNone
keywords cve vulnerability cli security nvd cpe
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # vuln-checker

[![PyPI version](https://img.shields.io/pypi/v/vuln-checker?color=brightgreen)](https://pypi.org/project/vuln-checker/)
![Python](https://img.shields.io/badge/python-3.11.0-blue)
[![CodeQL](https://github.com/skm248/vuln-checker/actions/workflows/github-code-scanning/codeql/badge.svg)](https://github.com/skm248/vuln-checker/actions/workflows/github-code-scanning/codeql)
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg)](LICENSE)
[![GitHub stars](https://img.shields.io/github/stars/skm248/vuln-checker?style=social)](https://github.com/skm248/vuln-checker/stargazers)

> ✨🔍 vuln-checker: Search CVEs by CPE product/version with Enhanced SBOM Support

---

## Features

- **Uses local NVD JSON feeds** to avoid external API dependency and speed up scanning.  
- **Auto-updates vulnerability feeds** automatically if older than 24 hours to ensure fresh data for detection.  
- **Parses CycloneDX-JSON SBOMs** generated by popular tools (e.g., Syft) to identify vulnerable components effectively.  
- **Fetches matching CPEs** (Common Platform Enumerations) using product names and version details for precise vulnerability mapping.  
- **Batch mode support** allowing scanning of multiple product-version pairs via CSV input for large scale assessments.  
- **Flexible export formats:** JSON, CSV, Excel (XLSX), and HTML reports with detailed vulnerability data.  
- **Fast scanning mode** using optimized algorithms to reduce analysis time while maintaining accuracy.  
- **Parallel processing** with configurable concurrency (`--max-workers`) to handle multiple scans efficiently.  
- **Command-line friendly** enabling seamless integration into CI/CD pipelines and automated workflows.  
- **Self-updating mechanism** via standard Python package management (`pip install --upgrade vuln-checker`) to stay current with latest vulnerability data and features.  
- **Detailed vulnerability reports** including CVE details, severity levels, and remediation recommendations to assist prioritization.  
- **Cross-platform support** compatible with major OSes (Linux, macOS, Windows) where Python and dependencies are supported.
- **Supports excluding false-positive CPEs** via an external excluded_cpes.txt file placed alongside the main script.

---

## Installation

**Install via pip:**

```bash
pip install vuln-checker
```

**Or from GitHub:**

```bash
git clone https://github.com/skm248/vuln-checker.git
cd vuln_checker
pip install -r requirements.txt
pip install .
```

## Usage
#### Command-Line Options

Run `vuln-checker --help` to see the full, current set of options. Selected and notable flags implemented in `vuln_checker/main.py`:

- `--input-csv` : Path to CSV file with product/version rows (mutually exclusive with `--products`, `--cpes-file`, `--sbom`).
- `--products` : Product/version mapping string (e.g. `jquery:1.11.3,1.11.5 lodash:3.5.0`).
- `--cpes-file` : File with one CPE per line to look up directly.
- `--sbom` : Path to a CycloneDX SBOM (JSON).
- `--fast` : Enable faster parallel processing using caching.
- `--max-workers` : Number of parallel workers (default: 5).
- `--max-components` : Limit number of components processed (useful for quick runs).
- `--skip-search` : Skip components without existing CPEs.
- `--update-feeds` : Force download of latest NVD JSON feeds (see `nvd_feeds/`).
- `--force-update` : When used with `--update-feeds`, forces re-download even if feeds are fresh.
- `--feed-dir` : Directory containing NVD feeds (default: `nvd_feeds`).
- `--cache-file` : Path to the CVE cache file (default: `cve_cache.json`).
- `--no-clear-cache` : Prevent clearing the CVE cache when running.
- `--migrate-cache` : Attempt to migrate/normalize an existing cache file.
- `--severity` : Comma-separated severity filter (e.g. `Critical,High`).
- `--format` : Output format (`json`, `csv`, `html`, `excel`). Default: `json`.
- `--output` : Output filename for reports.
- `--upgrade` : Check PyPI for a newer `vuln-checker` version and, if available, start an upgrade process.
- `--yes` : Auto-confirm interactive prompts (used by `--upgrade` to skip the confirmation prompt).
- `--version` : Print the tool version and exit.

**Notes** on `--upgrade` behavior:
- When `--upgrade` is used the tool checks PyPI for the latest release. If a newer version exists, it prints the version and prompts to upgrade (unless `--yes` is passed).
- Upgrade implementation spawns a detached background Python subprocess that runs `pip install --upgrade --force-reinstall --no-cache-dir --user vuln-checker` using the same Python executable; the tool exits after starting the background process. The upgrade will only proceed if the package is installed via pip (it will skip otherwise).

---

**Examples:**
1. Single Product via Command-Line:
   ```bash
      vuln-checker --products "jquery:1.11.3,1.11.5 lodash:3.5.0" --format html --output custom_report.html
   ```
      - Fetches CVEs for multiple products/versions provided as a comma-separated list.

2. Batch Processing with CSV: 
     - Create a products.csv file with the following format:

          products,versions\
          jquery,1.11.3,1.11.5\
          lodash,3.5.0
     - Run:
       ```bash
          vuln-checker --input-csv products.csv --format csv --output output.csv
       ```
     -  Processes all product/version pairs from the CSV.

3. Filter by Severity: 
   ```bash
      vuln-checker --products "jquery:1.11.3,1.11.5" --severity critical,high --format json --output output.json
   ```
    -   Filters CVEs with HIGH severity only.

4.	Specify Output File: 
    ```bash
       vuln-checker --input-csv products.csv --format html --output custom_report.html
    ```
    -   Saves the report to a custom file name.


## 📦 New Features
**--version**

You can now check the current installed version of the vuln-checker tool using:

   ```bash
      vuln-checker --version
   ```
   - This fetches the version directly from the pyproject.toml file, ensuring consistency with your package metadata.

**--upgrade**
Easily upgrade to the latest version of vuln-checker from PyPI using:

  ```bash
      vuln-checker --upgrade
  ```

This command will:
1. Check the latest available version on PyPI.
2. Compare it with your currently installed version.
3. Only upgrade if a newer version is available.

To auto-confirm the upgrade (without a prompt), use the --yes flag:

  ```bash
      vuln-checker --upgrade --yes
  ```
⚠️ If you already have the latest version installed, the tool will skip the upgrade.

## Excluded CPEs Configuration

This tool supports **excluding specific CPE entries** from vulnerability scans to help reduce false positives.

Excluded CPEs must be listed (one per line) in a plain text file named **`excluded_cpes.txt`**, located in the **same directory** as `main.py`.

At startup, the tool automatically loads this file and ignores any CVEs linked to the listed CPEs.

---

**Example:**

```text
# Exclude old Netty CPEs due to false positives
cpe:2.3:a:netty:netty:1.2.10:*:*:*:*:*:*:*
```
## File Format

- Each line in `excluded_cpes.txt` should contain **one full CPE string**.
- Lines starting with `#` are treated as **comments** and ignored.
- Blank lines are also ignored.
- The file must be saved in **plain text format**.

## 📦 vuln-checker Data Storage and Logging Overview

The **vuln-checker** tool automatically manages its own data files, NVD feed cache, and logs.  
All files are created and stored in **the directory where the tool is executed**, allowing you to run it from any location without changing your setup.

---

### 🚀 Running the Tool

You can run **vuln-checker** from **any folder**.  
All generated data (cache, NVD feeds, and logs) will be stored in that same folder.

### Example

```bash
cd /home/user/<User_Workspace>
vuln-checker
```

After running, you’ll see several new files and directories created in /home/user/\<User_Workspace>.

### 🗂️ Generated Files and Directories
-----------------------------------

### **1\. cve\_cache.json**

*   **Location:** cve\_cache.json    
*   **Purpose:** Stores locally cached CVE data for faster lookups during future runs.    
*   **Behavior:**    
    *   Created automatically on the first run.        
    *   Updated or reused between runs to improve performance.        
    *   Can be deleted anytime to rebuild a fresh cache.        

### **2\. nvd\_feed/**

*   **Location:** ./nvd\_feeds/    
*   **Purpose:** Contains downloaded **National Vulnerability Database (NVD)** JSON feeds used for vulnerability lookups.

    ```bash 
    nvdcve-1.1-2002.json.gz
    nvdcve-1.1-2003.json.gz
    ...
    nvdcve-1.1-2025.json.gz
    ```    
*   **Behavior:**    
    *   The tool downloads these feeds automatically if missing.        
    *   Feeds are kept locally to avoid re-downloading each time.        
    *   Updated periodically to reflect the latest vulnerability data.        

### **3\. logs/vuln-checker.log**

*   **Location:** vuln-checker.log    
*   **Purpose:** Stores detailed runtime logs for every execution, including loaded feeds, processing steps, and warnings.    
*   **Behavior:**
    
    *   Automatically created if not found.        
    *   Each run appends new entries.        
    *   Helpful for troubleshooting, monitoring updates, and verifying scan operations.        

#### Example Log Output:

    [2025-10-17 14:23:11] INFO: NVD feeds loaded (2002–2025)
    [2025-10-17 14:23:14] INFO: Cache file cve_cache.json loaded successfully
    [2025-10-17 14:23:20] INFO: Scan completed — 0 vulnerabilities found   `

To view logs:
`  cat logs/vuln-checker.log   `

or open the file directly in your preferred text editor.

### 🧠 Tips
-------

*   You can **run vuln-checker from any location** — all output stays in the same folder.
*   Check **vuln-checker.log** for clear details on what happened during a scan.
*   Automatically **cve_cache.json** will get updated untill you use --no-clear-cache to not delete.
*   Auto-updates feeds in the **nvd_feeds** folder if older than 24 hours.


#### Final Arguments
    --input-csv INPUT_CSV               CSV file of products and versions
    --products PRODUCTS                 Products and versions string
    --cpes-file CPES_FILE               Path to file of CPEs
    --sbom SBOM                         Path to CycloneDX SBOM file (JSON)
    --fast                              Fast mode: parallel processing with caching
    --max-workers MAX_WORKERS           Number of parallel workers
    --max-components MAX_COMPONENTS     Limit number of components to process
    --skip-search                       Skip components without existing CPEs
    --update-feeds                      Download the latest NVD JSON feeds
    --force-update                      Force re-download all feeds even if fresh
    --feed-dir FEED_DIR                 Directory for NVD feeds (default: nvd_feeds)
    --cache-file CACHE_FILE             CVE cache file location
    --no-clear-cache                    Prevent clearing the CVE cache
    --migrate-cache                     Migrate and normalize existing CVE cache
    --severity SEVERITY                 Severity filter (comma separated)
    --format                            json,csv,html,excel
    --output OUTPUT                     Report output filename
    --upgrade                           Upgrade vuln-checker
    --yes                               Auto-confirm prompts
    --version                           show program's version number and exit

### Notes
1. Exactly one of --input-csv or --products or --cpes-file or --sbom must be provided.
2. Hyperlinks in CSV are formatted as Excel =HYPERLINK formulas, and in JSON as a dictionary with url and value fields.
____

### MIT License

Copyright (c) 2025 skm248

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "vuln-checker",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": null,
    "keywords": "cve, vulnerability, cli, security, nvd, cpe",
    "author": null,
    "author_email": "skm248 <saikrishnameda248@outlook.com>",
    "download_url": "https://files.pythonhosted.org/packages/08/17/d9f69c8d21d181a926358038e61ccf165c591ae34363d4b43828996060fd/vuln_checker-0.5.5.tar.gz",
    "platform": null,
    "description": "# vuln-checker\r\n\r\n[![PyPI version](https://img.shields.io/pypi/v/vuln-checker?color=brightgreen)](https://pypi.org/project/vuln-checker/)\r\n![Python](https://img.shields.io/badge/python-3.11.0-blue)\r\n[![CodeQL](https://github.com/skm248/vuln-checker/actions/workflows/github-code-scanning/codeql/badge.svg)](https://github.com/skm248/vuln-checker/actions/workflows/github-code-scanning/codeql)\r\n[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg)](LICENSE)\r\n[![GitHub stars](https://img.shields.io/github/stars/skm248/vuln-checker?style=social)](https://github.com/skm248/vuln-checker/stargazers)\r\n\r\n> \u2728\ud83d\udd0d vuln-checker: Search CVEs by CPE product/version with Enhanced SBOM Support\r\n\r\n---\r\n\r\n## Features\r\n\r\n- **Uses local NVD JSON feeds** to avoid external API dependency and speed up scanning.  \r\n- **Auto-updates vulnerability feeds** automatically if older than 24 hours to ensure fresh data for detection.  \r\n- **Parses CycloneDX-JSON SBOMs** generated by popular tools (e.g., Syft) to identify vulnerable components effectively.  \r\n- **Fetches matching CPEs** (Common Platform Enumerations) using product names and version details for precise vulnerability mapping.  \r\n- **Batch mode support** allowing scanning of multiple product-version pairs via CSV input for large scale assessments.  \r\n- **Flexible export formats:** JSON, CSV, Excel (XLSX), and HTML reports with detailed vulnerability data.  \r\n- **Fast scanning mode** using optimized algorithms to reduce analysis time while maintaining accuracy.  \r\n- **Parallel processing** with configurable concurrency (`--max-workers`) to handle multiple scans efficiently.  \r\n- **Command-line friendly** enabling seamless integration into CI/CD pipelines and automated workflows.  \r\n- **Self-updating mechanism** via standard Python package management (`pip install --upgrade vuln-checker`) to stay current with latest vulnerability data and features.  \r\n- **Detailed vulnerability reports** including CVE details, severity levels, and remediation recommendations to assist prioritization.  \r\n- **Cross-platform support** compatible with major OSes (Linux, macOS, Windows) where Python and dependencies are supported.\r\n- **Supports excluding false-positive CPEs** via an external excluded_cpes.txt file placed alongside the main script.\r\n\r\n---\r\n\r\n## Installation\r\n\r\n**Install via pip:**\r\n\r\n```bash\r\npip install vuln-checker\r\n```\r\n\r\n**Or from GitHub:**\r\n\r\n```bash\r\ngit clone https://github.com/skm248/vuln-checker.git\r\ncd vuln_checker\r\npip install -r requirements.txt\r\npip install .\r\n```\r\n\r\n## Usage\r\n#### Command-Line Options\r\n\r\nRun `vuln-checker --help` to see the full, current set of options. Selected and notable flags implemented in `vuln_checker/main.py`:\r\n\r\n- `--input-csv` : Path to CSV file with product/version rows (mutually exclusive with `--products`, `--cpes-file`, `--sbom`).\r\n- `--products` : Product/version mapping string (e.g. `jquery:1.11.3,1.11.5 lodash:3.5.0`).\r\n- `--cpes-file` : File with one CPE per line to look up directly.\r\n- `--sbom` : Path to a CycloneDX SBOM (JSON).\r\n- `--fast` : Enable faster parallel processing using caching.\r\n- `--max-workers` : Number of parallel workers (default: 5).\r\n- `--max-components` : Limit number of components processed (useful for quick runs).\r\n- `--skip-search` : Skip components without existing CPEs.\r\n- `--update-feeds` : Force download of latest NVD JSON feeds (see `nvd_feeds/`).\r\n- `--force-update` : When used with `--update-feeds`, forces re-download even if feeds are fresh.\r\n- `--feed-dir` : Directory containing NVD feeds (default: `nvd_feeds`).\r\n- `--cache-file` : Path to the CVE cache file (default: `cve_cache.json`).\r\n- `--no-clear-cache` : Prevent clearing the CVE cache when running.\r\n- `--migrate-cache` : Attempt to migrate/normalize an existing cache file.\r\n- `--severity` : Comma-separated severity filter (e.g. `Critical,High`).\r\n- `--format` : Output format (`json`, `csv`, `html`, `excel`). Default: `json`.\r\n- `--output` : Output filename for reports.\r\n- `--upgrade` : Check PyPI for a newer `vuln-checker` version and, if available, start an upgrade process.\r\n- `--yes` : Auto-confirm interactive prompts (used by `--upgrade` to skip the confirmation prompt).\r\n- `--version` : Print the tool version and exit.\r\n\r\n**Notes** on `--upgrade` behavior:\r\n- When `--upgrade` is used the tool checks PyPI for the latest release. If a newer version exists, it prints the version and prompts to upgrade (unless `--yes` is passed).\r\n- Upgrade implementation spawns a detached background Python subprocess that runs `pip install --upgrade --force-reinstall --no-cache-dir --user vuln-checker` using the same Python executable; the tool exits after starting the background process. The upgrade will only proceed if the package is installed via pip (it will skip otherwise).\r\n\r\n---\r\n\r\n**Examples:**\r\n1. Single Product via Command-Line:\r\n   ```bash\r\n      vuln-checker --products \"jquery:1.11.3,1.11.5 lodash:3.5.0\" --format html --output custom_report.html\r\n   ```\r\n      - Fetches CVEs for multiple products/versions provided as a comma-separated list.\r\n\r\n2. Batch Processing with CSV: \r\n     - Create a products.csv file with the following format:\r\n\r\n          products,versions\\\r\n          jquery,1.11.3,1.11.5\\\r\n          lodash,3.5.0\r\n     - Run:\r\n       ```bash\r\n          vuln-checker --input-csv products.csv --format csv --output output.csv\r\n       ```\r\n     -  Processes all product/version pairs from the CSV.\r\n\r\n3. Filter by Severity: \r\n   ```bash\r\n      vuln-checker --products \"jquery:1.11.3,1.11.5\" --severity critical,high --format json --output output.json\r\n   ```\r\n    -   Filters CVEs with HIGH severity only.\r\n\r\n4.\tSpecify Output File: \r\n    ```bash\r\n       vuln-checker --input-csv products.csv --format html --output custom_report.html\r\n    ```\r\n    -   Saves the report to a custom file name.\r\n\r\n\r\n## \ud83d\udce6 New Features\r\n**--version**\r\n\r\nYou can now check the current installed version of the vuln-checker tool using:\r\n\r\n   ```bash\r\n      vuln-checker --version\r\n   ```\r\n   - This fetches the version directly from the pyproject.toml file, ensuring consistency with your package metadata.\r\n\r\n**--upgrade**\r\nEasily upgrade to the latest version of vuln-checker from PyPI using:\r\n\r\n  ```bash\r\n      vuln-checker --upgrade\r\n  ```\r\n\r\nThis command will:\r\n1. Check the latest available version on PyPI.\r\n2. Compare it with your currently installed version.\r\n3. Only upgrade if a newer version is available.\r\n\r\nTo auto-confirm the upgrade (without a prompt), use the --yes flag:\r\n\r\n  ```bash\r\n      vuln-checker --upgrade --yes\r\n  ```\r\n\u26a0\ufe0f If you already have the latest version installed, the tool will skip the upgrade.\r\n\r\n## Excluded CPEs Configuration\r\n\r\nThis tool supports **excluding specific CPE entries** from vulnerability scans to help reduce false positives.\r\n\r\nExcluded CPEs must be listed (one per line) in a plain text file named **`excluded_cpes.txt`**, located in the **same directory** as `main.py`.\r\n\r\nAt startup, the tool automatically loads this file and ignores any CVEs linked to the listed CPEs.\r\n\r\n---\r\n\r\n**Example:**\r\n\r\n```text\r\n# Exclude old Netty CPEs due to false positives\r\ncpe:2.3:a:netty:netty:1.2.10:*:*:*:*:*:*:*\r\n```\r\n## File Format\r\n\r\n- Each line in `excluded_cpes.txt` should contain **one full CPE string**.\r\n- Lines starting with `#` are treated as **comments** and ignored.\r\n- Blank lines are also ignored.\r\n- The file must be saved in **plain text format**.\r\n\r\n## \ud83d\udce6 vuln-checker Data Storage and Logging Overview\r\n\r\nThe **vuln-checker** tool automatically manages its own data files, NVD feed cache, and logs.  \r\nAll files are created and stored in **the directory where the tool is executed**, allowing you to run it from any location without changing your setup.\r\n\r\n---\r\n\r\n### \ud83d\ude80 Running the Tool\r\n\r\nYou can run **vuln-checker** from **any folder**.  \r\nAll generated data (cache, NVD feeds, and logs) will be stored in that same folder.\r\n\r\n### Example\r\n\r\n```bash\r\ncd /home/user/<User_Workspace>\r\nvuln-checker\r\n```\r\n\r\nAfter running, you\u2019ll see several new files and directories created in /home/user/\\<User_Workspace>.\r\n\r\n### \ud83d\uddc2\ufe0f Generated Files and Directories\r\n-----------------------------------\r\n\r\n### **1\\. cve\\_cache.json**\r\n\r\n*   **Location:** cve\\_cache.json    \r\n*   **Purpose:** Stores locally cached CVE data for faster lookups during future runs.    \r\n*   **Behavior:**    \r\n    *   Created automatically on the first run.        \r\n    *   Updated or reused between runs to improve performance.        \r\n    *   Can be deleted anytime to rebuild a fresh cache.        \r\n\r\n### **2\\. nvd\\_feed/**\r\n\r\n*   **Location:** ./nvd\\_feeds/    \r\n*   **Purpose:** Contains downloaded **National Vulnerability Database (NVD)** JSON feeds used for vulnerability lookups.\r\n\r\n    ```bash \r\n    nvdcve-1.1-2002.json.gz\r\n    nvdcve-1.1-2003.json.gz\r\n    ...\r\n    nvdcve-1.1-2025.json.gz\r\n    ```    \r\n*   **Behavior:**    \r\n    *   The tool downloads these feeds automatically if missing.        \r\n    *   Feeds are kept locally to avoid re-downloading each time.        \r\n    *   Updated periodically to reflect the latest vulnerability data.        \r\n\r\n### **3\\. logs/vuln-checker.log**\r\n\r\n*   **Location:** vuln-checker.log    \r\n*   **Purpose:** Stores detailed runtime logs for every execution, including loaded feeds, processing steps, and warnings.    \r\n*   **Behavior:**\r\n    \r\n    *   Automatically created if not found.        \r\n    *   Each run appends new entries.        \r\n    *   Helpful for troubleshooting, monitoring updates, and verifying scan operations.        \r\n\r\n#### Example Log Output:\r\n\r\n    [2025-10-17 14:23:11] INFO: NVD feeds loaded (2002\u20132025)\r\n    [2025-10-17 14:23:14] INFO: Cache file cve_cache.json loaded successfully\r\n    [2025-10-17 14:23:20] INFO: Scan completed \u2014 0 vulnerabilities found   `\r\n\r\nTo view logs:\r\n`  cat logs/vuln-checker.log   `\r\n\r\nor open the file directly in your preferred text editor.\r\n\r\n### \ud83e\udde0 Tips\r\n-------\r\n\r\n*   You can **run vuln-checker from any location** \u2014 all output stays in the same folder.\r\n*   Check **vuln-checker.log** for clear details on what happened during a scan.\r\n*   Automatically **cve_cache.json** will get updated untill you use --no-clear-cache to not delete.\r\n*   Auto-updates feeds in the **nvd_feeds** folder if older than 24 hours.\r\n\r\n\r\n#### Final Arguments\r\n    --input-csv INPUT_CSV               CSV file of products and versions\r\n    --products PRODUCTS                 Products and versions string\r\n    --cpes-file CPES_FILE               Path to file of CPEs\r\n    --sbom SBOM                         Path to CycloneDX SBOM file (JSON)\r\n    --fast                              Fast mode: parallel processing with caching\r\n    --max-workers MAX_WORKERS           Number of parallel workers\r\n    --max-components MAX_COMPONENTS     Limit number of components to process\r\n    --skip-search                       Skip components without existing CPEs\r\n    --update-feeds                      Download the latest NVD JSON feeds\r\n    --force-update                      Force re-download all feeds even if fresh\r\n    --feed-dir FEED_DIR                 Directory for NVD feeds (default: nvd_feeds)\r\n    --cache-file CACHE_FILE             CVE cache file location\r\n    --no-clear-cache                    Prevent clearing the CVE cache\r\n    --migrate-cache                     Migrate and normalize existing CVE cache\r\n    --severity SEVERITY                 Severity filter (comma separated)\r\n    --format                            json,csv,html,excel\r\n    --output OUTPUT                     Report output filename\r\n    --upgrade                           Upgrade vuln-checker\r\n    --yes                               Auto-confirm prompts\r\n    --version                           show program's version number and exit\r\n\r\n### Notes\r\n1. Exactly one of --input-csv or --products or --cpes-file or --sbom must be provided.\r\n2. Hyperlinks in CSV are formatted as Excel =HYPERLINK formulas, and in JSON as a dictionary with url and value fields.\r\n____\r\n\r\n### MIT License\r\n\r\nCopyright (c) 2025 skm248\r\n\r\nPermission is hereby granted, free of charge, to any person obtaining a copy\r\nof this software and associated documentation files (the \"Software\"), to deal\r\nin the Software without restriction, including without limitation the rights\r\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\r\ncopies of the Software, and to permit persons to whom the Software is\r\nfurnished to do so, subject to the following conditions:\r\n\r\nThe above copyright notice and this permission notice shall be included in all\r\ncopies or substantial portions of the Software.\r\n\r\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\r\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\r\nSOFTWARE.\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "CLI tool to fetch CVEs using NVD Feeds",
    "version": "0.5.5",
    "project_urls": null,
    "split_keywords": [
        "cve",
        " vulnerability",
        " cli",
        " security",
        " nvd",
        " cpe"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "70401999dde90b1dda0ec3d9ea4535f466ff3f88527d9cf23d16c45cc58cf9e6",
                "md5": "c6a6d414393343c4b7e8826aa3f60d95",
                "sha256": "f5fb2548702d4a71b6e90793f8053c46e7d930783608b6b5719db8408584b3a5"
            },
            "downloads": -1,
            "filename": "vuln_checker-0.5.5-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "c6a6d414393343c4b7e8826aa3f60d95",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 23287,
            "upload_time": "2025-10-21T14:42:49",
            "upload_time_iso_8601": "2025-10-21T14:42:49.400394Z",
            "url": "https://files.pythonhosted.org/packages/70/40/1999dde90b1dda0ec3d9ea4535f466ff3f88527d9cf23d16c45cc58cf9e6/vuln_checker-0.5.5-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "0817d9f69c8d21d181a926358038e61ccf165c591ae34363d4b43828996060fd",
                "md5": "a77799b83c9c7b76c09ed1dc3fcb31d6",
                "sha256": "c4b7bb5cc5ae9f0573e2f9f070f1ebb10be00b6c4e83e6159bf06d8b74d3c49f"
            },
            "downloads": -1,
            "filename": "vuln_checker-0.5.5.tar.gz",
            "has_sig": false,
            "md5_digest": "a77799b83c9c7b76c09ed1dc3fcb31d6",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 27655,
            "upload_time": "2025-10-21T14:42:50",
            "upload_time_iso_8601": "2025-10-21T14:42:50.460059Z",
            "url": "https://files.pythonhosted.org/packages/08/17/d9f69c8d21d181a926358038e61ccf165c591ae34363d4b43828996060fd/vuln_checker-0.5.5.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-10-21 14:42:50",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "vuln-checker"
}
        
Elapsed time: 2.68744s