OWASP JSEC CVE Details

=Main=



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

OWASP JSEC CVE Details

 * 1) OWASP JSEC CVE DETAILS is an opensource application developed in Java that uses the api provided by cvedetails.com to receive latest CVE updates. Apart from fetching the latest CVEs, it can also be used to search for expoits and vulnerabilities from exploitsearch.net. This tool is used to find and gather information related to CVEs.

Introduction

 * 1) The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. MITRE Corporation maintains the system, with funding from the National Cyber Security Division of the United States Department of Homeland Security.CVE is used by the Security Content Automation Protocol, and CVE IDs are listed on MITRE's system[2] as well as the US National Vulnerability Database.


 * 1) www.cvedetails.com provides an easy to use web interface to CVE vulnerability data.You can browse for vendors, products and versions and view cve entries, vulnerabilities,related to them. You can view statistics about vendors, products and versions of products.CVE details are displayed in a single, easy to use page


 * 1) www.exploitsearch.net, is an attempt at cross referencing/correlating exploits and vulnerability data from various sources and making the resulting database available to everyone.


 * [Features]
 * [+] Fetch Recent CVEs
 * [New Features included in v2.0]
 * [+] Search for vulnerabilities of different platform/application/categories
 * [+] Search CVEs
 * [+] Search POC & Exploits

Licensing
OWASP JSEC CVE Details is free to use. It is licensed under the GNU GPL v3 license.


 * valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |

What is JSEC CVE Details?
OWASP JSEC CVE Details provides:


 * a Jar Executable File

Presentation
Link to presentation 

Project Leader
[mailto:dibyendu.coder@gmail.com Dibyendu Sikdar]

Related With
SillyCon - OWASP Kolkata Chapter


 * valign="top" style="padding-left:25px;width:200px;" |

Github
Github!

Quick Download
Download now!

Email List
Sign up!

News and Events

 * [13 June 2014] Released the project as opensource
 * [17 August 2014] Requested for OWASP project approval
 * [20 August 2014] Project Proposal Accepted
 * [22 September 2014 ] v2.0 released

Classifications

 * }

=FAQs=


 * Q1
 * A1


 * Q2
 * A2

= Acknowledgements =

Volunteers
The primary contributors to date have been:


 * Debarshi Das - Designing OWASP Logo

Others

 * Adam - Exploit Search (exploitsearch.net)
 * Admin - cvedetails.com

= Road Map and Getting Involved = As of August, 2014, the priorities are:


 * This tool uses the api provided by cvedetails.com.
 * Using this tool the user can receive latest CVE details and choosing the type of vulnerability i.e. CSRF / XSS / etc
 * Other features to be added in future are like searching the Proof of Concepts for every CVE that is listed.
 * This project has already been started by me and it is available at http://dibsy.github.io/JSEC_CVE_DETAILS/

Involvement in the development and promotion of JSEC CVE Details is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
 * Find bugs in the code
 * Suggest ideas

=Project About=