CVE Information searcer on Python
# ๐ CVE Quick Lookup Tool
A fast and minimal Python CLI tool to fetch CVE (Common Vulnerabilities and Exposures) information from NVD and other popular security resources.
---
## โ๏ธ Features
- Retrieves CVE title, description, and CVSS scores from NVD.
- Highlights severity with color using CVSS.
- Provides quick access to related resources:
- GitHub
- CVEDetails
- ExploitDB
- MITRE CVE
- Google Dorks
- Vulners
- Rapid7
---
## ๐งช Demo
```bash
Enter CVE-ID: CVE-2024-3094
๐ Source: https://nvd.nist.gov/vuln/detail/CVE-2024-3094
๐ Title: CVE-2024-3094
๐ก CVSS 3.x: Red Hat, Inc.: 10.0 CRITICAL
๐ก CVSS 4.0: NVD: N/A
๐ก CVSS 2.0: NVD: N/A
๐ Description: Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
๐ Sources:
๐ป๏ธ Github - https://github.com/search?q=CVE-2024-3094&type=repositories
๐ก๏ธ CVEDetails - https://www.cvedetails.com/cve/CVE-2024-3094/
๐ฅ ExploitDB - https://exploit-db.com/search?q=CVE-2024-3094
๐ CVE Details - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3094
๐ Google Dorks - https://www.google.com/search?q=CVE-2024-3094+exploit
๐ Vulners - https://vulners.com/search?query=CVE-2024-3094
๐ Rapid7 - https://www.rapid7.com/db/?query=CVE-2024-3094
```
---
## ๐ฆ Requirements
```bash
pip install -r requirements.txt
```
## ๐ Usage
Clone the repository:
```bash
git clone https://github.com/hiitaro/CVE-Searcher.git
cd CVE-Searcher
```
Run the script:
```bash
python cvelookup.py
```
Enter any CVE ID (e.g. CVE-2024-12345) to get detailed info.
## ๐ก Why Us