get-cve 0.9.3

Tools for CVE managing, exploring and collect some data about their weaknesses and classifications
# Tyr - get-cve

## Installation
`cargo install get-cve`

## Purpose
This command line utility allows to explore fixed CVE on debian/redhat like OS.

The exploration is based on their changelog.

`git-cve` don't download CVE database to explore all open CVE on a package. There are several other good tools for this exploration.

## Usage on some linux distro
To explore all fixed CVE for an installed package:
```[bash,source]
get-cve <package>
```
or if several version are installing:
```[bash, source]
get-cve <package>=<version>
```
Eg:
```[bash, source]
# get-cve less
[less => 590-1ubuntu0.22.04.3]
CVE-2014-9488
CVE-2022-46663
CVE-2022-48624
CVE-2024-32487
#
```
To explore all options run `get-cve help`

## Common usage
With the common usage, this command make its queries directly on the NVD Nist database.

Eg:
```[bash, source]
# get-cve new
Cycle run query: 0
CVE-2024-44373
CVE-2024-45062
CVE-2025-2988
CVE-2025-31988
...
CVE-2025-9156
CVE-2025-9157
CVE-2025-9165
```

It's possible to search a list of CVE for a CPE string matching.
Eg:

```[bash, source]
$ get-cve f "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*"
Cycle run query: 0
CVE-1999-0794
CVE-2004-0848
CVE-2005-2127
...
CVE-2021-41368
CVE-2022-26901
CVE-2023-36767
```

## Authors and acknowledgment
Help will be appreciated. All tools will be developed with rust technology.

## License
This project is under MIT license.

## Project status
This project is under development and all contributions are welcome.

These tools are provided without any guaranties.