Skip to content

password123456/nvd-cve-database

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

NVD/CVE® Database

Hits

This repository contains a current compilation of Common Vulnerabilities and Exposures (CVE) sourced from the National Vulnerability Database (NVD). The CVE entries are presented in JSON format to facilitate seamless integration and use.

We are also sharing information (CVE-ID) from this repository through alternative channels. Feel free to participate if interested.(No Cost, Just FREE)

ID Item Channel
1 NVD Latest CVEs (Sync with this Repo)
2 NVD Latest High Risky CVEs (For Engineers)

Data Sample

This repository contains lightweight CVE data describing vulnerabilities sourced from the NVD and CVE® dictionaries.

{
  "totalResults": 4,
  "datePublished": "2024-03-20T06:58:25.276459Z",
  "vulnerabilities": [
    {
      "cve": {
        "id": "CVE-2024-2333",
        "sourceIdentifier": "cna@vuldb.com",
        "published": "2024-03-09T16:15:42.790",
        "lastModified": "2024-03-11T01:32:29.610",
        "baseScore": 6.3,
        "baseSeverity": "MEDIUM",
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "description": "A vulnerability classified as critical has been found in CodeAstro Membership Management System 1.0. Affected is an unknown function of the file /add_members.php. The manipulation of the argument fullname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256284.",
        "cweIds": [
          {
            "id": "CWE-89",
            "description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
          }
        ],
        "references": [
          {
            "url": "https://github.com/0x404Ming/CVE_Hunter/blob/main/SQLi-3.md"
          },
          {
            "url": "https://vuldb.com/?ctiid.256284"
          },
          {
            "url": "https://vuldb.com/?id.256284"
          }
        ]
      }
    },
...

Licensing

Common Vulnerabilities and Exposures (CVE®)

The CVE® is maintained by the Mitre Corporation.

Mitre CVE®'s Terms of use:

CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive,
no-charge, royalty-free, irrevocable copyright license to reproduce, prepare
derivative works of, publicly display, publicly perform, sublicense, and
distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for
such purposes is authorized provided that you reproduce MITRE's copyright
designation and this license in any such copy.

National Vulnerabilitiy Database (NVD)

The National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP).

It is a superset of the CVE® dictionary augmented with additional analysis, a database, and a fine-grained search engine.

NVD's FAQ:

All NVD data is freely available from our XML Data Feeds. There are no fees,
licensing restrictions, or even a requirement to register. All NIST
publications are available in the public domain according to Title 17 of the
United States Code. Acknowledgment of the NVD  when using our information is
appreciated. In addition, please email nvd@nist.gov to let us know how the
information is being used.

Disclaimer

We provide streamlined data by selectively extracting essential components from the original CVE information without altering the source data.

In cases where there are errors in the original CVE source data, such errors may also manifest in the CVE data within this repository. Additionally, interruptions or system downtimes in the original CVE source may lead to the omission of some CVE-IDs.

Please be aware that we do not operate a system of 1000% integrity synchronization with the original CVE sources. We suggest being aware of the potential consequences that may arise from such situations. We are confident that the information in this repository is free of issues in typical circumstances.

And...

If you find this helpful, please the "star"🌟 to support further improvements.

Releases

No releases published

Sponsor this project

 

Packages

No packages published