Directly use ${parameter#word} of sh(1) - plumb - Open certain URL patterns with an ad-hoc opener (plumber)
 (HTM) hg clone https://bitbucket.org/iamleot/plumb
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
       ---
 (DIR) changeset 0c5ddb73f952b5b5e9070f64a50ea62494440598
 (DIR) parent 2aa1df6ae9bc450bb86793b00bee3aed595c5fb6
 (HTM) Author: Leonardo Taccari <iamleot@gmail.com>
       Date:   Mon, 26 Mar 2018 20:51:31 
       
       Directly use ${parameter#word} of sh(1)
       
       (No need to disturb printf(1) and cut(1))
       
       Diffstat:
        openers/cve |  2 +-
        1 files changed, 1 insertions(+), 1 deletions(-)
       ---
       diff -r 2aa1df6ae9bc -r 0c5ddb73f952 openers/cve
       --- a/openers/cve       Mon Mar 26 17:15:03 2018 +0200
       +++ b/openers/cve       Mon Mar 26 20:51:31 2018 +0200
       @@ -1,7 +1,7 @@
        #!/bin/sh
        
        for u in "$@"; do
       -       cve="$(printf "%s\n" "$u" | cut -d : -f 2)"
       +       cve="${u#*://}"
               cveurl="https://nvd.nist.gov/vuln/detail/${cve}"
               plumb "${cveurl}"
        done