cve-search | perform local searches for known vulnerabilities | Security Testing library

 by   cve-search Python Version: v4.2.1 License: AGPL-3.0

kandi X-RAY | cve-search Summary

kandi X-RAY | cve-search Summary

cve-search is a Python library typically used in Testing, Security Testing applications. cve-search has build file available, it has a Strong Copyleft License and it has medium support. However cve-search has 177 bugs and it has 3 vulnerabilities. You can download it from GitHub.

[Join the chat at cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs. The main objective of the software is to avoid doing direct and public lookups into the public CVE databases. Local lookups are usually faster and you can limit your sensitive queries via the Internet. cve-search includes a back-end to store vulnerabilities and related information, an intuitive web interface for search and managing vulnerabilities, a series of tools to query the system and a web API interface. cve-search is used by many organizations including the [public CVE services of CIRCL] This document gives you basic information how to start with cve-search. For more information please refer to the documentation in the /doc folder of this project.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              cve-search has a medium active ecosystem.
              It has 2054 star(s) with 571 fork(s). There are 101 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 6 open issues and 438 have been closed. On average issues are closed in 64 days. There are 7 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of cve-search is v4.2.1

            kandi-Quality Quality

              cve-search has 177 bugs (0 blocker, 0 critical, 96 major, 81 minor) and 498 code smells.

            kandi-Security Security

              cve-search has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              OutlinedDot
              cve-search code analysis shows 3 unresolved vulnerabilities (1 blocker, 2 critical, 0 major, 0 minor).
              There are 62 security hotspots that need review.

            kandi-License License

              cve-search is licensed under the AGPL-3.0 License. This license is Strong Copyleft.
              Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.

            kandi-Reuse Reuse

              cve-search releases are available to install and integrate.
              Build file is available. You can build the component from source.
              Installation instructions, examples and code snippets are available.
              cve-search saves you 9615 person hours of effort in developing the same functionality from scratch.
              It has 19617 lines of code, 543 functions and 156 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed cve-search and discovered the below as its top functions. This is intended to give you an instant insight into cve-search implemented functionality, and help decide if they suit your requirements.
            • Create a Flask application
            • Returns the CORS allowed CORS settings
            • Return a redis token connection
            • Read a setting
            • Download a site
            • Store the content of the given response content
            • Sanitize an object
            • Return a session object
            • Start the application
            • Create the Flask application
            • Process a file to queue
            • Populate the cve database
            • Pretty print CVE data
            • Retrieves the CPE for a given cveid
            • Load authentication methods
            • Process a file
            • Validate a user against the local database
            • Return the VERSION tag
            • Create indexes
            • Handle the progress bar
            • Login to IDP
            • Process the collection
            • Handle login
            • Add a new item
            • Process the request
            • Start fetch processing
            • List all available products
            Get all kandi verified functions for this library.

            cve-search Key Features

            No Key Features are available at this moment for cve-search.

            cve-search Examples and Code Snippets

            NIST CVE Search tool,Usage
            Pythondot img1Lines of Code : 66dot img1License : Strong Copyleft (GPL-3.0)
            copy iconCopy
            » python3 search.py -h
            usage: search.py [-h] [-s] -y YEAR [-c COUNT] search
            
            positional arguments:
              search                Search query (regex capable)
            
            optional arguments:
              -h, --help            show this help message and exit
              -s, --short          
            default
            Shelldot img2Lines of Code : 37dot img2License : Non-SPDX
            copy iconCopy
                Surfraw - Shell Users' Revolutionary Front Rage Against the Web
            
                ______  _     _  ______   _______  ______   _______  _  _  _
               / _____)(_)   (_)(_____ \ (_______)(_____ \ (_______)(_)(_)(_)
              ( (____   _     _  _____) ) _____    _____) ) __  
            default
            Shelldot img3Lines of Code : 37dot img3License : Non-SPDX (NOASSERTION)
            copy iconCopy
                Surfraw - Shell Users' Revolutionary Front Rage Against the Web
            
                ______  _     _  ______   _______  ______   _______  _  _  _
               / _____)(_)   (_)(_____ \ (_______)(_____ \ (_______)(_)(_)(_)
              ( (____   _     _  _____) ) _____    _____) ) __  

            Community Discussions

            QUESTION

            DAST security scaning of a IoT Nodemcu esp8266 LUA script www HTML server connected to camera and A/C relay
            Asked 2021-Apr-08 at 01:04

            I have not, but shall DAST* security test, out of curiosity, an IoT device; Nodemcu esp8266 www server I built. It's showing a HTML page (on a mobile phone for example) that allows to control and interact with a camera module and a A/C relay. With it I can for example show images captured in the camera I even think it has some image recognition built in, and I can switch on and off a relay for electrical current to a light bulb (110/220v A/C power)

            Before I start pentest I though I better start thinking of what types of exploits one would be able to find and detect? Which sinister exploits I will be able to find, or rather ought be able to find given a proper pentest exercise? (And if I do not find exploits, my approach to the pentest of the Iot might be wrong)

            I ponder it might be a totally pointless exercise since the esp8266 www server (or rather its LUA programming libraries) might not have any security built into it, so basically it is "open doors" and everything with it is unsafe ?

            The test report might just conclude what I can foresee be that the the "user input needs to be sanitized"?

            Anyone have any idea what such pentest of a generic IoT device generally reports? Maybe it is possible to crash or reset the IoT device? Buffer overruns, XXS, call own code ?

            I might use ZAP or Burpsuite or similar DAST security test tool.

            • I could of course SAST test it instead, or too, but I think it will be hard to find a static code analyzer for the NodeMCU libraries and NUA scripting language easily ? I found some references here though: https://ieeexplore.ieee.org/abstract/document/8227299 but it seems to be a long read.

            So if someone just have a short answer what to expect in a DAST scan/pentest , it would be much appreciated.

            Stay safe and secure out there ! Zombieboy

            ...

            ANSWER

            Answered 2021-Apr-08 at 01:04

            I do my vulnerability scanning with OpenVAS (I assume this is what you mean by pentesting?). I am not aware of any IOT focused Tools.

            If your server is running on esp8266, i would imagine that there is no much room for authentication and encryption of http traffic, but correct me if i am wrong).

            Vulnerability Scan results might show things like unencrypted http traffic, credentials transmitted in cleartext (if you have any credentials fields in the pages served by the web server) etc. Depending on if there is encryption, you might also see weak encryption findings.

            You might get some false positives on your lua webserver reacting like other known webservers when exploits are applied. I have seen this kind of false positive specially on DoS vulnerabilities when a vulnerability scan is testing a vulnerability and the server becomes unresponsive. Depending on how invasive your vulnerability scanner is, you might get a lot of false positives for DoS on such a constrained platform.

            Source https://stackoverflow.com/questions/66995125

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install cve-search

            Check the [documentation](https://cve-search.github.io/cve-search/) to get you started.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries

            Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular Security Testing Libraries

            PayloadsAllTheThings

            by swisskyrepo

            sqlmap

            by sqlmapproject

            h4cker

            by The-Art-of-Hacking

            vuls

            by future-architect

            PowerSploit

            by PowerShellMafia

            Try Top Libraries by cve-search

            git-vuln-finder

            by cve-searchPython

            VIA4CVE

            by cve-searchPython

            PyCVESearch

            by cve-searchPython

            CVE-Search-Docker

            by cve-searchShell

            Plugins

            by cve-searchPython