{"id":13557274,"url":"https://github.com/opencve/opencve","last_synced_at":"2025-05-13T21:06:41.879Z","repository":{"id":37857541,"uuid":"298383750","full_name":"opencve/opencve","owner":"opencve","description":"Open-source CVE monitoring and alerting platform","archived":false,"fork":false,"pushed_at":"2025-04-27T20:40:06.000Z","size":11031,"stargazers_count":1979,"open_issues_count":73,"forks_count":255,"subscribers_count":42,"default_branch":"master","last_synced_at":"2025-04-28T12:12:08.643Z","etag":null,"topics":["cve","cybersecurity","django","infosec","mitre","nvd","python","security-tools","vulnerabilities","vulnerability-management"],"latest_commit_sha":null,"homepage":"https://www.opencve.io","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/opencve.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2020-09-24T20:07:03.000Z","updated_at":"2025-04-28T10:45:39.000Z","dependencies_parsed_at":"2023-12-07T23:30:00.281Z","dependency_job_id":"0c978cb2-f1d1-4ee2-86a7-c0964f668502","html_url":"https://github.com/opencve/opencve","commit_stats":{"total_commits":124,"total_committers":18,"mean_commits":6.888888888888889,"dds":0.25,"last_synced_commit":"911a6b366696b2a3fb16047f2ca1bb2033bb0b38"},"previous_names":[],"tags_count":14,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/opencve%2Fopencve","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/opencve%2Fopencve/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/opencve%2Fopencve/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/opencve%2Fopencve/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/opencve","download_url":"https://codeload.github.com/opencve/opencve/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":251311332,"owners_count":21569009,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve","cybersecurity","django","infosec","mitre","nvd","python","security-tools","vulnerabilities","vulnerability-management"],"created_at":"2024-08-01T12:04:15.207Z","updated_at":"2025-04-28T12:12:25.039Z","avatar_url":"https://github.com/opencve.png","language":"Python","readme":"\u003cp align=\"center\"\u003e\n  \u003cimg alt=\"OpenCVE\" src=\"https://raw.githubusercontent.com/opencve/opencve/v2/logo.png\" width=\"400px;\"\u003e\n\u003c/p\u003e\n\u003cp align=\"center\"\u003e\n  \u003ca href=\"https://github.com/opencve/opencve/actions?query=workflow%3ATests\"\u003e\u003cimg alt=\"Tests\" src=\"https://github.com/opencve/opencve/workflows/Tests/badge.svg\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://www.python.org/\"\u003e\u003cimg alt=\"Python versions\" src=\"https://img.shields.io/badge/python-3.10%2B-blue.svg\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://github.com/python/black\"\u003e\u003cimg alt=\"Code style: black\" src=\"https://img.shields.io/badge/code%20style-black-000000.svg\"\u003e\u003c/a\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/opencve/opencve/master/opencve1.png\" width=\"350\" height=\"215\"\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/opencve/opencve/master/opencve2.png\" width=\"350\" height=\"215\"\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/opencve/opencve/master/opencve3.png\" width=\"350\" height=\"215\"\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/opencve/opencve/master/opencve4.png\" width=\"350\" height=\"215\"\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/opencve/opencve/master/opencve5.png\" width=\"350\" height=\"215\"\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/opencve/opencve/master/opencve6.png\" width=\"350\" height=\"215\"\u003e\n\u003c/p\u003e\n\n----------------\n\nTry **for free** OpenCVE on [https://www.opencve.io](https://www.opencve.io) or check [documentation](https://docs.opencve.io) to install it yourself.\n\n## What is OpenCVE\n\nOpenCVE is a platform designed to help you **manage and monitor** the CVE database. It synchronizes the list of CVE (Common Vulnerabilities and Exposures) and allows you to **search, filter, and organize** them based on various criteria.\n\nUsers can **subscribe** to specific vendors or products and **receive notifications** when a new CVE is added or an existing one is updated. These notifications can be delivered via **Email or Webhook** (additional notification methods, such as **Slack**, are planned for future releases).\n\nOpenCVE cross-references information from multiple reliable sources such as **MITRE**, **Vulnrichment**, **NVD**, and **RedHat**. This ensures that the vulnerability data remains accurate and up-to-date, even if one of the sources is temporarily unavailable.\n\n## Features\n\n- **Explore** the CVE database and filter the results by Vendor, Product, CVSS score or CWE\n- **Subscribe** to vendors and products extracted from CPE\n- **Organize** your subscription in your organizations and your projects\n- **Invite** other members into your organizations\n- **Be notified** for new CVE and for CVE updates based on subscriptions\n- **Analyse** all CVE details (vendors, products, CVSS score, CPE, CWE, References...)\n- **Create** custom tags (unread, important, devteam...) to organize the CVE list\n- **Display** the history of each CVE and see their last changes in the homepage\n- **Retrieve** the last changes in custom reports\n- **Customize** the notification settings (type of change, filter by score...)\n- **Integrate** OpenCVE with your own tools using the Webhook notification or the Rest API\n\nYou can use **for free** these features on the public instance: [https://www.opencve.io](https://www.opencve.io).\n\n## How to Use OpenCVE\n\n1. **Self-Hosted**: You can install and configure OpenCVE on your own server using Docker. This provides full control over your instance.\n2. **SaaS Version**: Alternatively, you can use the hosted version of OpenCVE, available at [https://www.opencve.io](https://www.opencve.io). This option requires no setup and is ready to use out of the box.\n\nYou can explore the [documentation](https://docs.opencve.io) for detailed instructions like the installation, the notifications configuration or the API usage.\n","funding_links":[],"categories":["cybersecurity","Python","security","security-tools"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fopencve%2Fopencve","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fopencve%2Fopencve","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fopencve%2Fopencve/lists"}