FossID Documentation

Getting vulnerabilities through the command line interface

Vulnerabilities can be queried using the command line interface providing a CPE or list of CPEs as input.

Requirements

The target host must contain FossID security volume. The host can be configured either using --host option or specifying it in the [CLI] section of the ‘fossid.conf’.

How to obtain vulnerability information for a CPE

The command line interface expects the CPE specification using the --cpe option. Several CPEs can be input comma separated.

Example

Looking vulnerabilities for the Linux Kernel version 2.6.0.

fossid-cli --config /fossid/etc/fossid.conf --cpe "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"

Looking vulnerabilities for the Linux Kernel version 2.6.0, 2.6.4 and 2.6.8

fossid-cli --config /fossid/etc/fossid.conf --cpe \
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*, cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*, cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"