KcVE is a comprehensive CVE (Common Vulnerabilities and Exposures) tool that allows users to gather and parse information about the latest vulnerabilities from publicly available sources. It features are easy-to-use that allows users to access informations with just a few clicks.
The app exports the information in an HTML format, making it easy to share and analyze. This tool is ideal for security professionals, researchers, and others who need to stay informed about the latest vulnerabilities and ensure the security of their systems.
With KcVE, users can access the latest information about CVEs quickly and efficiently, giving them the ability to take action to protect their systems and data.
Before installing KcVE, you will need to make sure you have the following dependencies installed:
>= python 3.10
>= pip 22.3.1
To install KcVE, you can use the following command:
git clone https://github.com/Kccorp/KcVE.git
cd KcVE
pip install -r requirements.txt
If you want to use Docker, you just need to create the results folder and skip to the Usage section.
mkdir results
python main.py [-h] [-k KEYWORD] -s STARTDATE -e ENDDATE [-v VENDOR] [-p PRODUCT] [-w OUTPUT]
docker run --rm -v [absolute path to results folder]:/app/KcVe/results -it kcbod/kcve:latest [arguments]
python main.py -s "2023-01-01" -e "2023-02-01" -v "fortinet" -p "fortios" -w "fortios.html"
docker run --rm -v [absolute path to results folder]:/app/KcVe/results -it kcbod/kcve:latest -s "2023-01-01" -e "2023-02-01" -v "fortinet" -p "fortios" -w "fortios.html"
CVE Search
options:
-h, --help show this help message and exit
-k KEYWORD, --keyword KEYWORD
Keyword to search for
-s STARTDATE, --startDate STARTDATE
Start date to search for
-e ENDDATE, --endDate ENDDATE
End date to search for
-v VENDOR, --vendor VENDOR
Vendor to search for
-p PRODUCT, --product PRODUCT
Product to search for
-w OUTPUT, --output OUTPUT
Output file name