A command line utility for parsing vendor bulletins in CVRF format.
Currently there is only a Fortinet module that processes Fortinet's RSS feed for new advisories and allows the user to filter by CVSS score and/or product types to display vulnerabilities of interest or check whether specific product versions are affected.
go install github.com/jakewarren/cvrf-review@latest
❯ cvrf-review -h
Review CVRF formmated vulnerability data
Usage:
cvrf-review [flags]
cvrf-review [command]
Available Commands:
completion Generate the autocompletion script for the specified shell
fortinet Get Fortinet vulnerabilities
help Help about any command
Flags:
--disable-border Disable the table border
-h, --help Print usage
--json Print output in JSON format
--max-cvss-score float Filter vulnerabilities by a maximum CVSS score (default 10)
--min-cvss-score float Filter vulnerabilities by a minimum CVSS score
-s, --severity string Filter vulnerabilities by severity (critical, high, medium, low)
Use "cvrf-review [command] --help" for more information about a command.
cvrf-review fortinet affected --product FortiOS --version 6.4.10A WebAssembly-based front end is available for running the CLI in a browser. The GitHub Pages workflow builds the WASM binary automatically. For local testing, copy the runtime stub and build the module, then open index.html from a static file server.
cp "$(go env GOROOT)/lib/wasm/wasm_exec.js" .
GOOS=js GOARCH=wasm go build -o main.wasm .
# Serve from the repo root so index.html can fetch main.wasm
python3 -m http.server 8000
# Open http://localhost:8000/A hosted version is available here: https://jakewarren.github.io/cvrf-review/
Inspired by MaineK00n/vuls-data-update.
