Skip to content

Fetch vulnerability database from cert-bund and able to search for keywords, instead of scrolling through the website.

License

Notifications You must be signed in to change notification settings

G0urmetD/VulnSearch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VulnSearch

Fetch vulnerability database from cert-bund and able to search for keywords, instead of scrolling through the website.

Example

python3 main.py -keywords docker,zabbix,windows            
         _   _       _       _____                     _
        | | | |     | |     /  ___|                   | |
        | | | |_   _| |_ __ \ `--.  ___  __ _ _ __ ___| |__
        | | | | | | | | '_ \ `--. \/ _ \/ _` | '__/ __| '_ \
        \ \_/ / |_| | | | | /\__/ /  __/ (_| | | | (__| | | |
         \___/ \__,_|_|_| |_\____/ \___|\__,_|_|  \___|_| |_|

        Author: G0urmetD
        Version: 1.4

+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+
| Severity   | Status   | Name                        | Description                                        | Link                                                                        | Initial Date        | WID Nummer        |
+============+==========+=============================+====================================================+=============================================================================+=====================+===================+
| hoch       | Update   | [UPDATE] [hoch] Zabbix:     | Ein Angreifer kann mehrere Schwachstellen in       | https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1811 | 2024-08-16 08:03:23 | WID-SEC-2024-1811 |
|            |          | Mehrere Schwachstellen      | Zabbix ausnutzen, um Informationen offenzulegen,   |                                                                             |                     |                   |
|            |          |                             | Dateien zu manipulieren, Sicherheitsmaßnahmen zu   |                                                                             |                     |                   |
|            |          |                             | umgehen, einen Denial-of-Service-Zustand zu        |                                                                             |                     |                   |
|            |          |                             | verursachen oder beliebigen Code auszuführen.      |                                                                             |                     |                   |
+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+
| kritisch   | Neu      | [NEU] [kritisch] Microsoft  | Ein Angreifer kann mehrere Schwachstellen in       | https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1835 | 2024-08-14 09:38:39 | WID-SEC-2024-1835 |
|            |          | Windows: Mehrere            | Microsoft Windows, Microsoft Windows 10, Microsoft |                                                                             |                     |                   |
|            |          | Schwachstellen              | Windows 11, Microsoft Windows Server, Microsoft    |                                                                             |                     |                   |
|            |          |                             | Windows Server 2012, Microsoft Windows Server 2012 |                                                                             |                     |                   |
|            |          |                             | R2, Microsoft Windows Server 2016, Microsoft       |                                                                             |                     |                   |
|            |          |                             | Windows Server 2019 und Microsoft Windows Server   |                                                                             |                     |                   |
|            |          |                             | 2022 ausnutzen, um beliebigen Programmcode         |                                                                             |                     |                   |
|            |          |                             | auszuführen, beliebigen Programmcode mit           |                                                                             |                     |                   |
|            |          |                             | Administratorrechten auszuführen, seine            |                                                                             |                     |                   |
|            |          |                             | Privilegien zu erweitern, Informationen            |                                                                             |                     |                   |
|            |          |                             | offenzulegen, einen Denial of Service Zustand      |                                                                             |                     |                   |
|            |          |                             | herbeizuführen oder Sicherheitsvorkehrungen zu     |                                                                             |                     |                   |
|            |          |                             | umgehen.                                           |                                                                             |                     |                   |
+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+
| mittel     | Neu      | [NEU] [UNGEPATCHT] [mittel] | Ein lokaler Angreifer kann eine Schwachstelle in   | https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1813 | 2024-08-13 09:33:35 | WID-SEC-2024-1813 |
|            |          | Microsoft Windows:          | Microsoft Windows 10, Microsoft Windows 11,        |                                                                             |                     |                   |
|            |          | Schwachstelle ermöglicht    | Microsoft Windows Server 2016 und Microsoft        |                                                                             |                     |                   |
|            |          | Denial of Service           | Windows Server 2019 ausnutzen, um einen Denial of  |                                                                             |                     |                   |
|            |          |                             | Service Angriff durchzuführen.                     |                                                                             |                     |                   |
+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+
| mittel     | Update   | [UPDATE] [mittel] docker:   | Ein Angreifer kann mehrere Schwachstellen in       | https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1183 | 2024-08-12 10:11:30 | WID-SEC-2023-1183 |
|            |          | Mehrere Schwachstellen      | docker ausnutzen, um Sicherheitsmaßnahmen zu       |                                                                             |                     |                   |
|            |          |                             | umgehen, vertrauliche Informationen offenzulegen,  |                                                                             |                     |                   |
|            |          |                             | einen Denial-of-Service-Zustand auszulösen, seine  |                                                                             |                     |                   |
|            |          |                             | Privilegien zu erweitern und Daten zu              |                                                                             |                     |                   |
|            |          |                             | manipulieren.                                      |                                                                             |                     |                   |
+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+
| hoch       | Update   | [UPDATE] [hoch] docker:     | Ein entfernter Angreifer kann mehrere              | https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0272 | 2024-08-12 10:11:26 | WID-SEC-2024-0272 |
|            |          | Mehrere Schwachstellen      | Schwachstellen in Docker ausnutzen, um seine       |                                                                             |                     |                   |
|            |          |                             | Privilegien zu erhöhen, einen Denial-of-Service-   |                                                                             |                     |                   |
|            |          |                             | Zustand zu verursachen, vertrauliche Informationen |                                                                             |                     |                   |
|            |          |                             | offenzulegen, Sicherheitsmaßnahmen zu umgehen oder |                                                                             |                     |                   |
|            |          |                             | Dateien zu manipulieren.                           |                                                                             |                     |                   |
+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+
| mittel     | Update   | [UPDATE] [mittel] Microsoft | Ein lokaler Angreifer kann mehrere Schwachstellen  | https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1798 | 2024-08-20 08:11:06 | WID-SEC-2024-1798 |
|            |          | Windows: Mehrere            | in Microsoft Windows ausnutzen, um seine           |                                                                             |                     |                   |
|            |          | Schwachstellen ermöglichen  | Privilegien zu erhöhen.                            |                                                                             |                     |                   |
|            |          | Privilegieneskalation       |                                                    |                                                                             |                     |                   |
+------------+----------+-----------------------------+----------------------------------------------------+-----------------------------------------------------------------------------+---------------------+-------------------+

Usage

python3 main.py -update/-init # updates the datase and/or initialize the database columns
python3 main.py -keywords docker,zabbix # searches for entries with the keywords 'docker' and 'zabbix'
python3 main.py -keywords docker,zabbix -days 5 # searches for entries with the keywords 'docker' and 'zabbix' in the last 5 days

# using -status parameter (filter for new or updated vulernabilities)
python3 main.py -keywords docker,zabbix -status Neu
python3 main.py -keywords docker,zabbix -status Update

python3 main.py -keywords-file words.txt # searches for keywords out of the txt file
python3 main.py -keywords-file words.txt -days 5 # searches for keywords out of the txt file in the last 5 days

# check database entries
python3 main.py -checkdb
         _   _       _       _____                     _
        | | | |     | |     /  ___|                   | |
        | | | |_   _| |_ __ \ `--.  ___  __ _ _ __ ___| |__
        | | | | | | | | '_ \ `--. \/ _ \/ _` | '__/ __| '_ \
        \ \_/ / |_| | | | | /\__/ /  __/ (_| | | | (__| | | |
         \___/ \__,_|_|_| |_\____/ \___|\__,_|_|  \___|_| |_|

        Author: G0urmetD
        Version: 1.4

usage: main.py [-h] [-update] [-keywords KEYWORDS] [-keywords-file KEYWORDS_FILE] [-days DAYS] [-init]
               [-status {Neu,Update}] [-checkdb]

Vulnerability Search Tool

options:
  -h, --help            show this help message and exit
  -update               Update the database with the latest advisories
  -keywords KEYWORDS    Comma separated list of keywords to search for
  -keywords-file KEYWORDS_FILE
                        Path to a file containing keywords to search for
  -days DAYS            Search for advisories in the last N days
  -init                 Switch parameter to initialiaze the database columns.
  -status {Neu,Update}  Search parameter to only output for New or Updated vulnerabilities. Not required.
  -checkdb              Displays database entries.

Automation

To automate the database update process, just use a cronjob and a small shell script. And do not forget to make the script executable.

#!/bin/bash
cd /home/kali/VulnSearch
python3 main.py -update

Then create a cronjob to run every 2 hours:

crontab -e
# choose the one you want

# then enter the cronjob to run every 4 hours and create a log file
0 */4 * * * /bin/bash /home/kali/VulnSearch/update_automation.sh >> /home/kali/VulnSearch/update_cron.log 2>&1

# check your edit with
crontab -l

About

Fetch vulnerability database from cert-bund and able to search for keywords, instead of scrolling through the website.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages