OWASP JSEC CVE Details

=Main=



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

OWASP JSEC CVE Details
OWASP JSEC CVE Details is is an opensource application developed in Java that is used to know about details of CVE, current CVE releases and also search exploits and proof of concept.

Introduction
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. MITRE Corporation maintains the system, with funding from the National Cyber Security Division of the United States Department of Homeland Security.CVE is used by the Security Content Automation Protocol, and CVE IDs are listed on MITRE's system[2] as well as the US National Vulnerability Database.

[Features] [+] Fetch Recent CVEs [New Features included in v2.0] [+] Search for vulnerabilities of different platform/application/categories [+] Search CVEs [+] Search POC & Exploits

Description
Project URL : http://dibsy.github.io/JSEC_CVE_DETAILS/

Licensing
OWASP JSEC CVE Details is free to use. It is licensed under the GNU GPL v3 license.


 * valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |

What is JSEC CVE Details?
OWASP JSEC CVE Details provides:


 * a Jar Executable File

Presentation
Link to presentation 

Project Leader
[mailto:dibyendu.coder@gmail.com Dibyendu Sikdar]

Related With
SillyCon - OWASP Kolkata Chapter


 * valign="top" style="padding-left:25px;width:200px;" |

Github
Github!

Quick Download
Download now!

Email List
Sign up!

News and Events

 * [13 June 2014] Released the project as opensource
 * [17 August 2014] Requested for OWASP project approval
 * [20 August 2014] Project Proposal Accepted
 * [22 September 2014 ] v2.0 released

Classifications

 * }

=FAQs=


 * Q1
 * A1


 * Q2
 * A2

= Acknowledgements =

Volunteers
The primary contributors to date have been:


 * Debarshi Das - Designing OWASP Logo

Others

 * Adam - Exploit Search (exploitsearch.net)
 * Admin - cvedetails.com

= Road Map and Getting Involved = As of August, 2014, the priorities are:


 * This tool uses the api provided by cvedetails.com.
 * Using this tool the user can receive latest CVE details and choosing the type of vulnerability i.e. CSRF / XSS / etc
 * Other features to be added in future are like searching the Proof of Concepts for every CVE that is listed.
 * This project has already been started by me and it is available at http://dibsy.github.io/JSEC_CVE_DETAILS/

Involvement in the development and promotion of JSEC CVE Details is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
 * Find bugs in the code
 * Suggest ideas

=Project About=