
Security News
Django Joins curl in Pushing Back on AI Slop Security Reports
Django has updated its security policies to reject AI-generated vulnerability reports that include fabricated or unverifiable content.
A set of tools useful when dealing with lists of vulnerability CVE IDs, such as those obtained from scans or dependency checks.
npm install cve-tools
There are several ways to use content, text files or strings, containing CVE
IDs such as CVE-2015-0001
, to generate a useful CSV file with a summary and
CVSS score for the listed vulnerabilities.
cd path/to/cve-tools
# From a file.
bin/create-cve-csv -f path/to/file > cves.csv
# From a file via pipe.
cat path/to/file | bin/create-cve-csv > cves.csv
# Directly.
bin/create-cve-csv "CVE-2015-0001 blah blah CVE-2015-0002, etc." > cves.csv
# Directly via pipe.
echo "CVE-2015-0001 blah blah CVE-2015-0002, etc." \
| bin/create-cve-csv > cves.csv
The output has the following format:
CVE ID | CSVV | URL | Summary |
---|---|---|---|
CVE-2015-0001 | 7.5 | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0001 | A helpful summary. |
CVE-2015-0002 | 5.0 | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0002 | A helpful summary. |
etc... |
Expect this to take a few moments to chew through the necessary data, especially if having to check CVEs from multiple different years.
FAQs
Bazaarvoice utilities for working with CVE IDs
The npm package cve-tools receives a total of 1 weekly downloads. As such, cve-tools popularity was classified as not popular.
We found that cve-tools demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Django has updated its security policies to reject AI-generated vulnerability reports that include fabricated or unverifiable content.
Security News
ECMAScript 2025 introduces Iterator Helpers, Set methods, JSON modules, and more in its latest spec update approved by Ecma in June 2025.
Security News
A new Node.js homepage button linking to paid support for EOL versions has sparked a heated discussion among contributors and the wider community.