This is a python3 alternative to gofetch
The tool has the same exact capabilities as gofetch where it plainly outputs the CVEs or alternatively include -info
to get the full CVE info.
😄
git clone https://github.com/k0imet/pyfetch.git
cd pyfetch
chmod +x pyfetch.py
./pyfetch.py
[demo@demo ~]$ ./pyfetch.py
Usage: pyfetch day|week [-info]
[demo@demo ~]$ ./pyfetch.py day
CVE-2022-4135
CVE-2022-4020
CVE-2022-4116
CVE-2022-3602
CVE-2021-35587
CVE-2017-5638
CVE-2022-31097
CVE-2022-23093
CVE-2022-24999
CVE-2022-44635
[demo@demo ~]$ ./pyfetch.py week
CVE-2022-4116
CVE-2022-23093
CVE-2022-21225
CVE-2022-41325
CVE-2022-3328
CVE-2022-4139
CVE-2022-37017
CVE-2022-30528
CVE-2022-4257
CVE-2022-28607
[demo@demo ~]$ ./pyfetch.py day -info
CVE-2022-4116
Description: A vulnerability was found in quarkus. This security flaw happens in Dev UI Config Editor which is vulnerable to drive-by localhost attacks leading to remote code execution.
Severity: CRITICAL
-----------------------------------
CVE-2022-23093
Description: None
Severity: None
-----------------------------------
CVE-2022-21225
Description: Improper neutralization in the Intel(R) Data Center Manager software before version 4.1 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
Severity: HIGH
-----------------------------------
[...]
[demo@demo pyfetch]$ ./send_cve_list.sh
Or
[demo@demo pyfetch] ./send_cve_list2.sh