Skip to main content

CVE Alerting Platform

Project description

OpenCVE

Tests Python versions Code style: black


Check the documentation to install and use OpenCVE.

We also provide a running instance on https://www.opencve.io if you don't want to host it yourself.

What is OpenCVE

OpenCVE is a platform used to locally import the list of CVEs and perform searches on it (by vendors, products, CVSS, CWE...).

Users subscribe to vendors or products, and OpenCVE alerts them when a new CVE is created or when an update is done in an existing CVE.

How does it work

OpenCVE uses the JSON feed provided by the NVD to update the local list of CVEs.

After an initial import, a background task is regularly executed to synchronize the local copy with the NVD feed. If a new CVE is added, or if a change is detected, the subscribers of the related vendors and products are alerted.

Requirements

OpenCVE works with Python >=3.6.

It uses the JSONB feature for performance, so you will need a PostgreSQL instance to store the data (CVE, Users, Vendors, Products, Subscriptions, ...). Other engines are not supported.

The pg_trgm module of PostgreSQL is required to let you search in the CVEs list. The upgrade-db command will enable it for you, but you can also do it yourself if you prefer (CREATE EXTENSION pg_trgm). From PostgreSQL 13 this module is considered as trusted, meaning it can be installed by non-superusers with the CREATE privilege.

Celery is used to periodically fetch the NVD database and update the list of CVEs. For that you will need a broker : we recommend you Redis for the ease of installation. Futhermore it is possible that future versions of OpenCVE will use a cache feature, in that case the Redis requirement will already be filled for you.

During the import of initial data OpenCVE will download and parse huge files, like the CPE dictionnary. For that we recommend you 3.5G RAM at least.

Installation

We provide 2 methods to install OpenCVE :

The second method can be useful if you don't want to manage the dependencies (like PostgreSQL, Redis or Celery).

Check these documentations for the details of each step (initial import, admin creation, etc).

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

opencve-1.2.0.tar.gz (1.4 MB view details)

Uploaded Source

Built Distribution

opencve-1.2.0-py3-none-any.whl (1.4 MB view details)

Uploaded Python 3

File details

Details for the file opencve-1.2.0.tar.gz.

File metadata

  • Download URL: opencve-1.2.0.tar.gz
  • Upload date:
  • Size: 1.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.0 pkginfo/1.5.0.1 requests/2.23.0 requests-toolbelt/0.9.1 tqdm/4.43.0 CPython/3.6.1

File hashes

Hashes for opencve-1.2.0.tar.gz
Algorithm Hash digest
SHA256 98f9d63517682f19284401da8c5d63c16d53940193a69761c3353df5f98db7c1
MD5 3335fa1e967e269e7d9f167278c93659
BLAKE2b-256 a49af20601f84443de65880faaf4d10a9685d8eb95382f000c63fa000efedd13

See more details on using hashes here.

File details

Details for the file opencve-1.2.0-py3-none-any.whl.

File metadata

  • Download URL: opencve-1.2.0-py3-none-any.whl
  • Upload date:
  • Size: 1.4 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.0 pkginfo/1.5.0.1 requests/2.23.0 requests-toolbelt/0.9.1 tqdm/4.43.0 CPython/3.6.1

File hashes

Hashes for opencve-1.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 2658f8f6e625b5b5fabeba24b8f4dd1e551c5be82495abfc482cf6cf22bd9f8a
MD5 d0dddce7dcb7a7802d7df165b5d10c23
BLAKE2b-256 a8af419cca1252de97fd84343e062b9fe18533bf9da45a3ce1f77f0585add159

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page