- Added support to
EPSS
- Exploit Prediction Scoring System. - Added support to
CISA
Known Exploited Vulnerability Catalog (KEV). - 3 new methods added under
risk.py
class:get_kev
: to retrieve information of Know Exploited Vulnerability if availableget_epss
: to retrieveprobability
andpercentile
information related to CVE.get_risk
: to enlist the whole information related to risks such ascvss
,epss
andkev
- Updated the JSON schema to reflect the new EPSS addition. As a result, the
risk
tag has been modified. 2 new indicatorsepss
andkev
has been added. With each comes a set of information. Please refer to the documentation. - Update
CAPEC
to version 3.8. - Enhanced the mapping to MITRE ATT&CK initiative.
- Regenerate the whole vFeed Professional Vulnerability Database alongside 'Sync & Use' private Github repositories.
- Documentation updated.
-
New feature "Common Patch Format" introduced. The
Defense
class has been updated to reflect a new methodget_patches
has been added. This method will enhance the methods already implemented in the pastget_advisory
. This new method will return the source(vendor), description, date of release, product, package, version fixed, version not fixed, status. For this first introduction, the CPF supports the packages from Ubuntu. Current January 2021, we will start adding support to Debian, Redhat, Fedora, Cisco, Suse (OpenSuse), Gentoo, Microsoft etc. -
Updated the JSON schema to reflect the new feature CPF (Common Patch Format) addition. As a result, the
Preventive
tag has been modified. Data with vulnerable packages & patches will be packed underpatches
tag & data with bulletins, bugs will be underbulletins
tag. -
Updated
Classification
class to better restructure data undertargets / packages
. The enumeration is better organized to list vendor, product & affected packages. -
Updated the JSON schema to version 1.2 to reflect the changes.
-
Regenerate the whole vFeed Professional Vulnerability Database alongside 'Sync & Use' private Github repositories.
-
Updated
Classification
class to reflect the changes made incapec_db
table following the update to version 3.2.- As a result, several
MITRE ATT&CK
identifiers has been added to the database.
- As a result, several
-
Regenerate the whole vFeed Professional Vulnerability Database alongside 'Sync & Use' private Github repositories.
-
Updated the method
get_targets
inClassification
class to reflect the changes made inmap_cpe_cve
table.- New keys added to JSON
targets
such as : ID of the configuration, from / to affected version and running (on/with) extension.
- New keys added to JSON
-
Added a JSON schema that describes the structure of vFeed JSON data. It could be used for validation purposes or to understand the JSON files design.
-
Reflected the changes in the documentation
-
Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.
- Added a new method
get_packages
toClassification
class. The method will return affected packages vendors, product names, versions and more information. - Reflected the changes of
get_packages
addition on the following:- Updated JSON files with the addition of
packages
key underclassification
section. Thepackages
key has a vendor section with multiple keys (product, version affected and condition) - Added new table
packages_db
in the SQLite database.
- Updated JSON files with the addition of
- Enhanced the
Search
class as follows:- Added a new method
search_cwe
to search per CWE (Common Weakness Enumeration). - Updated the
pyvfeed
CLI to search using 3 arguments (cve, cpe and cwe) - Code optimizated.
- Added a new method
- Updated
api_sample.py
to demonstate how to perform the following:- Call the
get_packages
in API mode - Search for CWE in API mode.
- Call the
- Fixed
requirement.txt
to support the latestPyYAML
version. - Reflected the changes in documentation
- Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.
- Enhanced the support to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™). 3 new keys added :
- Permission required (
permission_required
) - By passed defenses (
bypassed_defenses
) - data sources (
data_sources
)
- Permission required (
- Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.
- Added the support to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) initiative.
- Reflected the changes in the exported JSON files with the addition of
attack_mitre
key underranking
section. - Updated CAPEC data with "mitigations". Changes reflected with addition of a new key
mitigations
under CAPECparameters
section. - Modified key from
category
tocategorization
underranking
section. - Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.
- Optimized the code and export performance
- Modified tag from
attack_id
toattack_methods
- Added a basic search module for CVEs and CPEs.
- Code clean and fix.
- Reflected the changes in documentation
- Add support to third-party plugins. (Still in beta)
- Reflected the changes in documentation
- Fixed
api_sample.py
- Completed the
API reference
documentation
- Standarized the API JSON responses
- Added
api_sample.py
to demonstate how to use pyvfeed in API mode - Cleaned the code
- Reflected the changes in documentation
- First commit
- Sources dataset in concordance with vFeed IO Patent.
- Support to Amazon S3 Boto3
- Export to JSON & YAML
- Added documentation