https://github.com/dadav/scf
https://scf.readthedocs.io/en/stable/
https://github.com/dadav/scf
cve hacktoberfest python suse
Last synced: 5 months ago
JSON representation
https://scf.readthedocs.io/en/stable/
- Host: GitHub
- URL: https://github.com/dadav/scf
- Owner: dadav
- License: gpl-3.0
- Created: 2022-05-11T19:57:50.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2023-10-17T21:04:12.000Z (over 1 year ago)
- Last Synced: 2024-11-16T22:08:15.117Z (6 months ago)
- Topics: cve, hacktoberfest, python, suse
- Language: Python
- Homepage:
- Size: 147 KB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README

[](https://pypi.org/project/python-scf/)
[](https://github.com/dadav/scf/actions/)
[](https://codecov.io/gh/dadav/scf)
> SUSE CVE Fetcher (unofficial; not developed by SUSE)
scf is a small tool to fetch informations about CVEs from suse.com.
## ⏬ Installation
Install via `pypi` package:
```bash
pip install python-scf
```Or directly via source:
```bash
pip install git+https://github.com/dadav/scf
```## 📙 Documentation
👉 Please use [https://scf.readthedocs.io/en/stable/](https://scf.readthedocs.io/en/stable/)
## ⭐️ Usage
You can use it via command line:
```bash
# list all cve
scf cve list# export as json
scf cve list --json# fetch details for a specific cve
scf cve details CVE-2022-0001# watch for new CVE
scf cve watch# start a little api server
scf server run# prefetch some data (older years are excluded)
scf cache populate# show some stats about the local cache
scf cache stats
```Or in your python program:
```python
from rich import print
from scf.suse import get_all_cve, get_cve_detailslatest_cve = get_all_cve()[0]
details = get_cve_details(latest_cve)
print(f'[{latest_cve}] Score: {details.cvss.score}')
```## 💓 Contributors
> Made with [contributors-img](https://contrib.rocks).