Skip to main content

CVE Alerting Platform

Project description

OpenCVE

Tests Python versions Code style: black


Check the documentation to install and use OpenCVE.

We also provide a running instance on https://www.opencve.io if you don't want to host it yourself.

What is OpenCVE

OpenCVE is a platform used to locally import the list of CVEs and perform searches on it (by vendors, products, CVSS, CWE...).

Users subscribe to vendors or products, and OpenCVE alerts them when a new CVE is created or when an update is done in an existing CVE.

How does it work

OpenCVE uses the JSON feed provided by the NVD to update the local list of CVEs.

After an initial import, a background task is regularly executed to synchronize the local copy with the NVD feed. If a new CVE is added, or if a change is detected, the subscribers of the related vendors and products are alerted.

Requirements

OpenCVE works with Python >=3.6.

It uses the JSONB feature for performance, so you will need a PostgreSQL instance to store the data (CVE, Users, Vendors, Products, Subscriptions, ...). Other engines are not supported.

The pg_trgm module of PostgreSQL is required to let you search in the CVEs list. The upgrade-db command will enable it for you, but you can also do it yourself if you prefer (CREATE EXTENSION pg_trgm). From PostgreSQL 13 this module is considered as trusted, meaning it can be installed by non-superusers with the CREATE privilege.

Celery is used to periodically fetch the NVD database and update the list of CVEs. For that you will need a broker : we recommend you Redis for the ease of installation. Futhermore it is possible that future versions of OpenCVE will use a cache feature, in that case the Redis requirement will already be filled for you.

During the import of initial data OpenCVE will download and parse huge files, like the CPE dictionnary. For that we recommend you 3.5G RAM at least.

Installation

We provide 2 methods to install OpenCVE :

The second method can be useful if you don't want to manage the dependencies (like PostgreSQL, Redis or Celery).

Check these documentations for the details of each step (initial import, admin creation, etc).

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

opencve-1.2.3.tar.gz (1.4 MB view details)

Uploaded Source

Built Distribution

opencve-1.2.3-py3-none-any.whl (1.4 MB view details)

Uploaded Python 3

File details

Details for the file opencve-1.2.3.tar.gz.

File metadata

  • Download URL: opencve-1.2.3.tar.gz
  • Upload date:
  • Size: 1.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/3.10.0 pkginfo/1.5.0.1 requests/2.23.0 requests-toolbelt/0.9.1 tqdm/4.43.0 CPython/3.6.1

File hashes

Hashes for opencve-1.2.3.tar.gz
Algorithm Hash digest
SHA256 2fe3976013c9ed8f0eaa13bf1fd5590dccc21e637d0a5631660c3f444da8718f
MD5 857aed9d51492e94e9646533821c3396
BLAKE2b-256 2aa23ed7344d68c33300d0af65e5f541f1703f8505078262faa979d915a224bd

See more details on using hashes here.

File details

Details for the file opencve-1.2.3-py3-none-any.whl.

File metadata

  • Download URL: opencve-1.2.3-py3-none-any.whl
  • Upload date:
  • Size: 1.4 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/3.10.0 pkginfo/1.5.0.1 requests/2.23.0 requests-toolbelt/0.9.1 tqdm/4.43.0 CPython/3.6.1

File hashes

Hashes for opencve-1.2.3-py3-none-any.whl
Algorithm Hash digest
SHA256 0ba46018b0b9c62d372509cb532ded8b8074c0baebfe8c8364fe5dd265b70e38
MD5 e71d2c8bc2b21dde1b29a160bad20722
BLAKE2b-256 f917f1abf79a43d3177273841eacf879dea2942abacda51a3365996c58e1b3bd

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page