Skip to content

A utility to help security practitioners explore publicly known information about vulnerabilities.

License

Notifications You must be signed in to change notification settings

meddlin/cve-explorer

Repository files navigation

Vulnerability Explorer

A utility to help security practitioners explore publicly known information about vulnerabilities. Born out of a curiousity to understand the relationship between CVEs, CWEs, CVSS, and EPSS, this tool aims to explain related info and aid when investigating vulnerabilities.

Getting Started

This will start the client and support Node.js API routes.

npm install
npm run dev

Might need to select npm version with nvm first:

nvm use --lts

Optional: Python API

Start the API (Windows)

cd api
python -m venv .
.\Scripts\Activate
pip install -r requirements.txt
uvicorn main:app --reload

If you encounter [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions, then you likely already have something running on default port 8000.

uvicorn main:app --reload --port 9000

Start the API (Linux/MacOS)

cd api
fastapi run main.py

What are these?

(Coming soon...)

Explain, what is:

  • CVE
  • CVSS
  • CWE
  • EPSS

Good place to start -> https://www.balbix.com/insights/whats-the-difference-between-cve-and-cvss/

CVE

Data comes from the OpenCVE API: https://docs.opencve.io/api/cve/#get-cvestringid

CVSS Scores

Ref: https://www.first.org/cvss/v3.1/specification-document

  • Base Metric Group
  • Temporal Metric Group
  • Environmental Metric Group

References

EPSS API

NVD APIs

About

A utility to help security practitioners explore publicly known information about vulnerabilities.

Topics

Resources

License

Stars

Watchers

Forks

Sponsor this project

 

Packages

No packages published