CVE Information searcer on Python
# ๐ CVE Quick Lookup Tool
A fast and minimal Python CLI tool to fetch CVE (Common Vulnerabilities and Exposures) information from NVD and other popular security resources.
---
## โ๏ธ Features
- Retrieves CVE title, description, and CVSS scores from NVD.
- Highlights severity with color using CVSS.
- Provides quick access to related resources:
  - GitHub
  - CVEDetails
  - ExploitDB
  - MITRE CVE
  - Google Dorks
  - Vulners
  - Rapid7
---
## ๐งช Demo
```bash
Enter CVE-ID: CVE-2024-3094  
๐ Source: https://nvd.nist.gov/vuln/detail/CVE-2024-3094
  ๐ Title: CVE-2024-3094
    ๐ก  CVSS 3.x: Red Hat, Inc.: 10.0 CRITICAL
    ๐ก  CVSS 4.0: NVD: N/A
    ๐ก  CVSS 2.0: NVD: N/A
    ๐ Description: Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
๐ Sources:
    ๐ป๏ธ Github - https://github.com/search?q=CVE-2024-3094&type=repositories
    ๐ก๏ธ  CVEDetails - https://www.cvedetails.com/cve/CVE-2024-3094/
    ๐ฅ ExploitDB - https://exploit-db.com/search?q=CVE-2024-3094
    ๐ CVE Details - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3094
    ๐ Google Dorks -  https://www.google.com/search?q=CVE-2024-3094+exploit
    ๐ Vulners - https://vulners.com/search?query=CVE-2024-3094
    ๐ Rapid7 - https://www.rapid7.com/db/?query=CVE-2024-3094
```
---
## ๐ฆ Requirements
```bash
pip install -r requirements.txt
```
## ๐ Usage
Clone the repository:
```bash
git clone https://github.com/hiitaro/CVE-Searcher.git
cd CVE-Searcher
```
Run the script:
```bash
python cvelookup.py
```
Enter any CVE ID (e.g. CVE-2024-12345) to get detailed info.
## ๐ก Why Us