This script iterates through a specified directory (and its subdirectories) looking for JAR files, outputting a hyperlinked HTML file for quick CVE checks.
- PowerShell on the machine you'd like to scan
- A Github account (required only when clicking hyperlinks in the generated HTML file)
- A path to some application that has JAR files you'd like to assess
By default the script only searches for CVEs with "HIGH" or "CRITICAL" keywords which helps to reduce the amount of returned hits.