A command-line tool to search for CVEs (Common Vulnerabilities and Exposures) using public APIs. Results are displayed with color formatting and details using the rich library.
- Search CVEs by ID (using cve.circl.lu)
- Search CVEs by keyword in description (using NVD)
- Prints formatted CVE details (ID, published/modified date, CVSS score, severity, description, references)
- Interactive menu or command-line arguments
- Python 3.7+
- requests
- rich
git clone https://github.com/DebaA17/CVE-scanner-cli.git
cd CVE-scanner-cli
bash setup.shThis will install all dependencies in a virtual environment and create a cvecli command in your ~/.local/bin directory.
Make sure ~/.local/bin is in your PATH:
export PATH="$HOME/.local/bin:$PATH"cvecliYou will be prompted to enter either a CVE ID or a keyword. Just follow the on-screen instructions to search for CVEs by ID or by keyword in the description.
cvecli --id CVE-2025-55184cvecli --keyword wordpressResults are shown in the terminal with color formatting for better readability.
- CVE ID search uses the cve.circl.lu API.
- Keyword search uses the NVD API and returns up to 5 results per search.
This tool is provided for educational and informational purposes only. The owner and contributors are not responsible for any misuse, damage, or legal issues resulting from the use of this software. Use at your own risk.
Created by DEBASIS

