Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/xaitax/cisa-catalog-known-vulnerabilities
https://github.com/xaitax/cisa-catalog-known-vulnerabilities
Last synced: 7 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/xaitax/cisa-catalog-known-vulnerabilities
- Owner: xaitax
- Created: 2023-01-14T20:36:59.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-09-15T07:37:33.000Z (about 1 year ago)
- Last Synced: 2023-09-15T22:58:57.020Z (about 1 year ago)
- Language: HTML
- Size: 20.4 MB
- Stars: 15
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CISA Catalog of Known Exploited Vulnerabilities
The script, which is designed to be user-friendly and efficient, allows users to search through the CISA Catalog database offline for specific products or vendors, and then displays detailed information about any vulnerabilities that have been identified in those products or by those vendors. The information that is displayed also includes the vulnerability's Common Vulnerabilities and Exposures (CVE) number including a link to the NIST database.
It also features the possibility to display enhanced information about specific CVEs.This script is particularly useful for organizations and individuals that are required to comply with the new directive issued by the Cybersecurity & Infrastructure Security Agency (CISA), which mandates that federal agencies patch known vulnerability exploits as soon as possible. This directive is intended to help protect the government's networks and systems from cyber attacks by reducing the number of known vulnerabilities that can be exploited.
As part of this directive, CISA is also publishing a list of known vulnerability exploits to aid in this effort. This list is publicly available and can be accessed via the CISA website at https://www.cisa.gov/known-exploited-vulnerabilities-catalog. The list is regularly updated as new vulnerabilities are discovered and can be used as a reference for organizations and individuals to identify known vulnerabilities and take appropriate action to mitigate the risks associated with them.
# Functionality
The script offers the following possibilities:
## Info
```
$ python cisa_known.py info_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total: 975 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
```## Help
```
$ python cisa_known.py -h
usage: cisa_known.py [-h] {update,info,recent,stats,product,vendor,all,enriched,export} ...Search for a specific product/vendor in the CISA Catalog.
positional arguments:
{update,info,recent,stats,product,vendor,all,enriched,export}
update Check for updates and download the most recent version
info Print information about the CISA Catalog
recent Show 5 most recent additions to the CISA Catalog
stats Print statistics about the CISA Catalog
product Search for a specific product in the CISA Catalog
vendor Search for a specific vendor in the CISA Catalog
all Search for both product and vendor in the CISA Catalog
enriched Display detailed information about a CVE
export Export the data basic highcharts graphsoptions:
-h, --help show this help message and exit
```## Product Search
```
$ python cisa_known.py product "Office"_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total: 975 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalogCVEs found: 31
CVE ID: CVE-2018-0798
Product: Office
Vendor: Microsoft
Name: Microsoft Office Memory Corruption Vulnerability
Date: 2021-11-03
URL: https://nvd.nist.gov/vuln/detail/CVE-2018-0798
Info: Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0802.CVE ID: CVE-2018-0802
Product: Office
Vendor: Microsoft
Name: Microsoft Office Memory Corruption Vulnerability
Date: 2021-11-03
URL: https://nvd.nist.gov/vuln/detail/CVE-2018-0802
Info: Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0798.[...]
```## Vendor Search
```
$ python cisa_known.py vendor "Adobe"_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total: 975 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalogCVEs found: 60
CVE ID: CVE-2021-21017
Product: Acrobat and Reader
Vendor: Adobe
Name: Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability
Date: 2021-11-03
URL: https://nvd.nist.gov/vuln/detail/CVE-2021-21017
Info: Acrobat Acrobat and Reader contain a heap-based buffer overflow vulnerability that could allow an unauthenticated attacker to achieve code execution in the context of the current user.CVE ID: CVE-2021-28550
Product: Acrobat and Reader
Vendor: Adobe
Name: Adobe Acrobat and Reader Use-After-Free Vulnerability
Date: 2021-11-03
URL: https://nvd.nist.gov/vuln/detail/CVE-2021-28550
Info: Adobe Acrobat and Reader contains a use-after-free vulnerability that could allow an unauthenticated attacker to achieve code execution in the context of the current user.[...]
```## Detailed CVE Information
```
$ python cisa_known.py enriched "CVE-2023-36884"_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total: 975 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog{
"Modified": "2023-07-17T19:21:00",
"Published": "2023-07-11T19:15:00",
"access": {},
"assigner": "[email protected]",
"capec": [],
"cvss": null,
"cwe": "NVD-CWE-noinfo",
"id": "CVE-2023-36884",
"impact": {},
"last-modified": "2023-07-17T19:21:00",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884"
],
"summary": "Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents.\n\nAn attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file.\n\nUpon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.\n\nPlease see the Microsoft Threat Intelligence Blog https://aka.ms/Storm-0978 \u00a0Entry for important information about steps you can take to protect your system from this vulnerability.\n\nThis CVE will be updated with new information and links to security updates when they become available.\n\n",
"vulnerable_configuration": [
{
"id": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"title": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"title": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"title": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"title": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"title": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"title": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"title": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"title": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
},
{
"id": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
"title": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*"
},
{
"id": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
"title": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
"title": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*"
},
{
"id": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
"title": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"title": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
"title": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
"title": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
"title": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"title": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"title": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
"title": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"title": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
"title": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"title": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*"
},
{
"id": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
"title": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*"
}
],
"vulnerable_configuration_cpe_2_2": [],
"vulnerable_product": [
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*"
]
}
```## 5 Most Recently Added Vulnerabilities
```
$ python cisa_known.py recent_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total: 975 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog5 Most Recently Added Vulnerabilities:
CVE ID: CVE-2023-3519
Product: NetScaler ADC and NetScaler Gateway
Vendor: Citrix
Name: Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Date: 2023-07-19
URL: https://nvd.nist.gov/vuln/detail/CVE-2023-3519
Info: Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.CVE ID: CVE-2023-36884
Product: Office and Windows
Vendor: Microsoft
Name: Microsoft Office and Windows HTML Remote Code Execution Vulnerability
Date: 2023-07-17
URL: https://nvd.nist.gov/vuln/detail/CVE-2023-36884
Info: Microsoft Office and Windows contain an unspecified vulnerability that allows an attacker to perform remote code execution via a specially crafted Microsoft Office document.CVE ID: CVE-2022-29303
Product: Compact
Vendor: SolarView
Name: SolarView Compact Command Injection Vulnerability
Date: 2023-07-13
URL: https://nvd.nist.gov/vuln/detail/CVE-2022-29303
Info: SolarView Compact contains a command injection vulnerability due to improper validation of input values on the send test mail console of the product's web server.CVE ID: CVE-2023-37450
Product: Multiple Products
Vendor: Apple
Name: Apple Multiple Products WebKit Code Execution Vulnerability
Date: 2023-07-13
URL: https://nvd.nist.gov/vuln/detail/CVE-2023-37450
Info: Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that can allow an attacker to execute code when processing web content.CVE ID: CVE-2023-32046
Product: Windows
Vendor: Microsoft
Name: Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability
Date: 2023-07-11
URL: https://nvd.nist.gov/vuln/detail/CVE-2023-32046
Info: Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.
```## Top 10 Statistics (Vendor / Months)
```
$ python cisa_known.py stats_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total: 975 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalogTop 10 Vendors:
Microsoft: 265
Cisco: 63
Apple: 61
Adobe: 60
Google: 48
Oracle: 32
Apache: 28
VMware: 18
D-Link: 15
Citrix: 12Top 10 Months:
2021-11: 291
2022-03: 226
2022-05: 83
2022-06: 49
2022-04: 45
2022-01: 40
2022-02: 32
2022-09: 25
2023-06: 24
2022-08: 23
```## Update Functionality (including CVE details)
```
$ python cisa_known.py -uNewer version found online. Update? (yes/no) yes
Latest CISA database downloaded.
Downloading enriched CVE information.
Downloading enriched CVE information.
100%|█████████████████████████████████████████████████████████████████████████████████████████████████████████████| 977/977 [01:07<00:00, 14.45it/s]_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.20
Total: 977 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
```## Export to graph (the repository contains a template.html that can be adapted)
```
$ python cisa_known.py export_________ .___ _________ _____ _________ __ .__
\_ ___ \| |/ _____/ / _ \ \_ ___ \_____ _/ |______ | | ____ ____
/ \ \/| |\_____ \ / /_\ \ / \ \/\__ \ __ \__ \ | | / _ \ / ___\
\ \___| |/ \/ | \ \ \____/ __ \| | / __ \| |_( <_> ) /_/ >
\______ /___/_______ /\____|__ / \______ (____ /__| (____ /____/\____/\___ /
\/ \/ \/ \/ \/ \/ /_____/
Alexander Hagenah / [email protected] / @xaitax / v 0.5Title: CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.20
Total: 977 vulnerabilities
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalogGraph was successfully exported to file 'export_chart.html' in the directory '/home/xaitax/code/cisa-catalog-known-vulnerabilities/'.
```# Changelog
0.5
[Changed]
- Complete rewrite of the code
[Added]
- Export functionality with stats about Product, Vendor and Timeline vulnerabilities0.3
[Added]
- Display 5 Most Recently Added Vulnerabilities0.2
[Added]
- Local CVE Details retrieved from https://www.cve-search.org/
- Enriched CVE details via `-e CVE-2022-1020` or `--enriched CVE-2022-1020`0.1
- Initial version