Path to this page:
./
security/py-nvdlib,
National Vulnerability Database CPE/CVE API Library for Python
Branch: CURRENT,
Version: 0.7.9,
Package name: py312-nvdlib-0.7.9,
Maintainer: pkgsrc-usersNVDlib is a Python library that allows you to interface with the
NIST National Vulnerability Database (NVD), pull vulnerabilities
(CVEs), and Common Platform Enumeration (CPEs) into easily accessible
objects.
### Features
- Search the NVD for CVEs using all parameters allowed by the NVD
API (recently updated to utilize version 2 of the API). Including
search criteria such as CVE publish and modification date, keywords,
severity, score, or CPE name.
- Search CPE names by keywords, CPE match strings, or modification
dates. Then pull the CVE ID's that are relevant to those CPEs.
- Retrieve details on individual CVEs, their relevant CPE names,
and more.
- Built in rate limiting according to NIST NVD recommendations.
Get an API key to allow for a delay argument to be passed. Otherwise
it is 6 seconds between requests by default.
Master sites:
Filesize: 532.916 KB
Version history: (Expand)
- (2025-01-14) Updated to version: py312-nvdlib-0.7.9
- (2024-08-22) Updated to version: py312-nvdlib-0.7.7
- (2023-11-19) Package added to pkgsrc.se, version py311-nvdlib-0.7.6 (created)
CVS history: (Expand)
2025-01-14 07:43:18 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-nvdlib: updated to 0.7.9
0.7.9 (2025-01-13)
**Enhancements**
- Added missing CVSS 3.0 data for `attackVector`, `attackComplexity`, \
`privilegesRequired`, `userInteraction`, `scope`, `confidentialityImpact`, \
`integrityImpact`, and `availabilityImpact` as reported from \
https://github.com/vehemont/nvdlib/issues/48
- Added basic CVSS 4.0 data: `v40score`, `v40vector`, and `v40severity` in CVEs.
- Merged https://github.com/vehemont/nvdlib/pull/49 and \
https://github.com/vehemont/nvdlib/pull/50 to add more type hints and also fixes \
the MatchString search. Courtesy of @LachJones.
- Increased minimum required Python version to `3.11` or later from Python \
3.8.3. This opens up some cooler features and fixed a compatibility issue with \
`LiteralString` not being available until 3.11.
0.7.8 (2024-07-11)
**Enhancements**
- Merged https://github.com/vehemont/nvdlib/pull/44
- Updated delay parameter to a float.
- Removed verbose in favor of the Python logging module.
To try out the new logging addition, try the simple logger configuration below. \
It will create a file named "example_NVDLib.log" and will log NVDLib \
and Requests actions into the file. Syntax errors/HTTP server errors are logging \
level of "error", URLs requested (similar output to the previous \
`verbose` parameter) are set to "debug".
```
import logging
import nvdlib
logging.basicConfig(filename='example_NVDLib.log', encoding='utf-8', \
level=logging.DEBUG)
r = nvdlib.searchCVE(keywordSearch="Microsoft")
```
|
2024-11-11 08:29:31 by Thomas Klausner | Files touched by this commit (862) |
Log message:
py-*: remove unused tool dependency
py-setuptools includes the py-wheel functionality nowadays
|
2024-08-22 11:56:57 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-nvdlib: updated to 0.7.7
0.7.7 (2024-06-02)
**Bugfixes**
- Fix cwe attr in CVE by @jobselko in https://github.com/vehemont/nvdlib/pull/39
**Enhancements**
- Added CPE Match String API with `nvdlib.searchCPEmatch`, check out the \
documentation at \
https://nvdlib.com/en/latest/v2/CVEv2.html#CPE-Match-Criteria-API and more \
information can be found at the NVD API documentation page: \
https://nvd.nist.gov/developers/products
|
2023-11-19 02:16:31 by Thomas Klausner | Files touched by this commit (4) | |
Log message:
security/py-nvdlib: import py-nvdlib-0.7.6
NVDlib is a Python library that allows you to interface with the
NIST National Vulnerability Database (NVD), pull vulnerabilities
(CVEs), and Common Platform Enumeration (CPEs) into easily accessible
objects.
### Features
- Search the NVD for CVEs using all parameters allowed by the NVD
API (recently updated to utilize version 2 of the API). Including
search criteria such as CVE publish and modification date, keywords,
severity, score, or CPE name.
- Search CPE names by keywords, CPE match strings, or modification
dates. Then pull the CVE ID's that are relevant to those CPEs.
- Retrieve details on individual CVEs, their relevant CPE names,
and more.
- Built in rate limiting according to NIST NVD recommendations.
Get an API key to allow for a delay argument to be passed. Otherwise
it is 6 seconds between requests by default.
|