cve 0.1.2 → 0.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/search.rb +5 -5
- metadata +17 -17
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: a1ca7e6d2ebd25c392e513cf2bf6b0687b3d1f4231151317cd024aae735cd1b1
|
|
4
|
+
data.tar.gz: 8e3ea102e044b6e3baa249ac3d7d69413eb1661ebcf8c6e09dc8b5f922d81d4e
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: a1eed901a0f4c88c04d1efc41107ad78a85e9fc931e00e90432f309ef99f8cd53594e6a61aca6a1318c370d3cd1903fe642376c766027c6a87e62f66bccb092b
|
|
7
|
+
data.tar.gz: 2fe8136248406948e18f41c252ca17fe79e72febed30ab3028d89e12f7b17daac866116601adb8b410d5655612f5c5e5ce71799edbe740a6270a46c933c629e2
|
data/lib/search.rb
CHANGED
|
@@ -36,7 +36,7 @@ class Search
|
|
|
36
36
|
if cpe_list.count > 0
|
|
37
37
|
puts "Please select a product:\n\n"
|
|
38
38
|
cpe_list.each_with_index do |cve, i|
|
|
39
|
-
puts "#{i}: #{cve[:title]} (#{cve[:cpe_name]}"
|
|
39
|
+
puts "#{i}: #{cve[:title]} (#{cve[:cpe_name]})"
|
|
40
40
|
end
|
|
41
41
|
puts "X: eXit and try again.\n\n"
|
|
42
42
|
else
|
|
@@ -58,15 +58,15 @@ class Search
|
|
|
58
58
|
def present_cve_list
|
|
59
59
|
cve_list = NVDHelper.cve_list_for(@cpe_name)
|
|
60
60
|
|
|
61
|
-
puts "\n--\nSearching
|
|
61
|
+
puts "\n--\nSearching NIST National Vulnerability Database for #{@cpe_title} ...\n\n"
|
|
62
62
|
case cve_list.count
|
|
63
63
|
when 0
|
|
64
|
-
puts "Unable to
|
|
64
|
+
puts "Unable to locate any CVEs for #{@cpe_title}."
|
|
65
65
|
when 1
|
|
66
|
-
puts "The following CVE is associated with #{@
|
|
66
|
+
puts "The following CVE is associated with #{@cpe_title}:\n\n"
|
|
67
67
|
puts cve_list.map { |cve| "https://nvd.nist.gov/vuln/detail/#{cve}" }
|
|
68
68
|
else
|
|
69
|
-
puts "The following CVEs are associated with #{@
|
|
69
|
+
puts "The following CVEs are associated with #{@cpe_title}:\n\n"
|
|
70
70
|
puts cve_list.map { |cve| "https://nvd.nist.gov/vuln/detail/#{cve}" }
|
|
71
71
|
end
|
|
72
72
|
end
|
metadata
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: cve
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.1.
|
|
4
|
+
version: 0.1.3
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Gerald Hilts
|
|
8
|
-
autorequire:
|
|
8
|
+
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
11
|
date: 2024-10-05 00:00:00.000000000 Z
|
|
@@ -14,42 +14,42 @@ dependencies:
|
|
|
14
14
|
name: gems
|
|
15
15
|
requirement: !ruby/object:Gem::Requirement
|
|
16
16
|
requirements:
|
|
17
|
-
- - "~>"
|
|
18
|
-
- !ruby/object:Gem::Version
|
|
19
|
-
version: '1.2'
|
|
20
17
|
- - ">="
|
|
21
18
|
- !ruby/object:Gem::Version
|
|
22
19
|
version: 1.2.0
|
|
20
|
+
- - "~>"
|
|
21
|
+
- !ruby/object:Gem::Version
|
|
22
|
+
version: '1.2'
|
|
23
23
|
type: :runtime
|
|
24
24
|
prerelease: false
|
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
|
26
26
|
requirements:
|
|
27
|
-
- - "~>"
|
|
28
|
-
- !ruby/object:Gem::Version
|
|
29
|
-
version: '1.2'
|
|
30
27
|
- - ">="
|
|
31
28
|
- !ruby/object:Gem::Version
|
|
32
29
|
version: 1.2.0
|
|
30
|
+
- - "~>"
|
|
31
|
+
- !ruby/object:Gem::Version
|
|
32
|
+
version: '1.2'
|
|
33
33
|
- !ruby/object:Gem::Dependency
|
|
34
34
|
name: httparty
|
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|
|
36
36
|
requirements:
|
|
37
|
-
- - "~>"
|
|
38
|
-
- !ruby/object:Gem::Version
|
|
39
|
-
version: '0.22'
|
|
40
37
|
- - ">="
|
|
41
38
|
- !ruby/object:Gem::Version
|
|
42
39
|
version: 0.22.0
|
|
40
|
+
- - "~>"
|
|
41
|
+
- !ruby/object:Gem::Version
|
|
42
|
+
version: '0.22'
|
|
43
43
|
type: :runtime
|
|
44
44
|
prerelease: false
|
|
45
45
|
version_requirements: !ruby/object:Gem::Requirement
|
|
46
46
|
requirements:
|
|
47
|
-
- - "~>"
|
|
48
|
-
- !ruby/object:Gem::Version
|
|
49
|
-
version: '0.22'
|
|
50
47
|
- - ">="
|
|
51
48
|
- !ruby/object:Gem::Version
|
|
52
49
|
version: 0.22.0
|
|
50
|
+
- - "~>"
|
|
51
|
+
- !ruby/object:Gem::Version
|
|
52
|
+
version: '0.22'
|
|
53
53
|
description: Command-line tool to search the NIST National Vulnerability Database
|
|
54
54
|
for CVE reports associated with a specific product and version.
|
|
55
55
|
email:
|
|
@@ -71,7 +71,7 @@ homepage: https://github.com/gwhilts/cve
|
|
|
71
71
|
licenses:
|
|
72
72
|
- MIT
|
|
73
73
|
metadata: {}
|
|
74
|
-
post_install_message:
|
|
74
|
+
post_install_message:
|
|
75
75
|
rdoc_options: []
|
|
76
76
|
require_paths:
|
|
77
77
|
- lib
|
|
@@ -86,8 +86,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
|
86
86
|
- !ruby/object:Gem::Version
|
|
87
87
|
version: '0'
|
|
88
88
|
requirements: []
|
|
89
|
-
rubygems_version: 3.
|
|
90
|
-
signing_key:
|
|
89
|
+
rubygems_version: 3.0.3.1
|
|
90
|
+
signing_key:
|
|
91
91
|
specification_version: 4
|
|
92
92
|
summary: CVE Lookup Utility
|
|
93
93
|
test_files: []
|