Skip to content

Latest commit

 

History

History
113 lines (88 loc) · 5.91 KB

CHANGELOG.md

File metadata and controls

113 lines (88 loc) · 5.91 KB

Changelog

1.2.0

  • Added support to EPSS - Exploit Prediction Scoring System.
  • Added support to CISA Known Exploited Vulnerability Catalog (KEV).
  • 3 new methods added under risk.py class:
    • get_kev : to retrieve information of Know Exploited Vulnerability if available
    • get_epss: to retrieve probability and percentile information related to CVE.
    • get_risk : to enlist the whole information related to risks such as cvss, epss and kev
  • Updated the JSON schema to reflect the new EPSS addition. As a result, the risk tag has been modified. 2 new indicators epss and kev has been added. With each comes a set of information. Please refer to the documentation.
  • Update CAPEC to version 3.8.
  • Enhanced the mapping to MITRE ATT&CK initiative.
  • Regenerate the whole vFeed Professional Vulnerability Database alongside 'Sync & Use' private Github repositories.
  • Documentation updated.

1.1.0

  • New feature "Common Patch Format" introduced. The Defense class has been updated to reflect a new method get_patches has been added. This method will enhance the methods already implemented in the past get_advisory. This new method will return the source(vendor), description, date of release, product, package, version fixed, version not fixed, status. For this first introduction, the CPF supports the packages from Ubuntu. Current January 2021, we will start adding support to Debian, Redhat, Fedora, Cisco, Suse (OpenSuse), Gentoo, Microsoft etc.

  • Updated the JSON schema to reflect the new feature CPF (Common Patch Format) addition. As a result, the Preventive tag has been modified. Data with vulnerable packages & patches will be packed under patches tag & data with bulletins, bugs will be under bulletins tag.

  • Updated Classification class to better restructure data under targets / packages. The enumeration is better organized to list vendor, product & affected packages.

  • Updated the JSON schema to version 1.2 to reflect the changes.

  • Regenerate the whole vFeed Professional Vulnerability Database alongside 'Sync & Use' private Github repositories.

1.0.0

  • Updated Classification class to reflect the changes made in capec_db table following the update to version 3.2.

    • As a result, several MITRE ATT&CK identifiers has been added to the database.
  • Regenerate the whole vFeed Professional Vulnerability Database alongside 'Sync & Use' private Github repositories.

0.9.9

  • Updated the method get_targets in Classification class to reflect the changes made in map_cpe_cve table.

    • New keys added to JSON targets such as : ID of the configuration, from / to affected version and running (on/with) extension.
  • Added a JSON schema that describes the structure of vFeed JSON data. It could be used for validation purposes or to understand the JSON files design.

  • Reflected the changes in the documentation

  • Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.

0.9.8

  • Added a new method get_packages to Classification class. The method will return affected packages vendors, product names, versions and more information.
  • Reflected the changes of get_packages addition on the following:
    • Updated JSON files with the addition of packages key under classification section. The packages key has a vendor section with multiple keys (product, version affected and condition)
    • Added new table packages_db in the SQLite database.
  • Enhanced the Search class as follows:
    • Added a new method search_cwe to search per CWE (Common Weakness Enumeration).
    • Updated the pyvfeed CLI to search using 3 arguments (cve, cpe and cwe)
    • Code optimizated.
  • Updated api_sample.py to demonstate how to perform the following:
    • Call the get_packages in API mode
    • Search for CWE in API mode.
  • Fixed requirement.txt to support the latest PyYAML version.
  • Reflected the changes in documentation
  • Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.

Beta 0.9.7

Beta 0.9.6

  • Added the support to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) initiative.
  • Reflected the changes in the exported JSON files with the addition of attack_mitre key under ranking section.
  • Updated CAPEC data with "mitigations". Changes reflected with addition of a new key mitigations under CAPEC parameters section.
  • Modified key from category to categorization under ranking section.
  • Regenerate the whole vFeed Professional Vulnerability Database alonside 'Sync & Use' private Github repositories.

Beta 0.9.5

  • Optimized the code and export performance
  • Modified tag from attack_id to attack_methods

Beta 0.9.4

  • Added a basic search module for CVEs and CPEs.
  • Code clean and fix.
  • Reflected the changes in documentation

Beta 0.9.3

  • Add support to third-party plugins. (Still in beta)
  • Reflected the changes in documentation

Beta 0.9.2

  • Fixed api_sample.py
  • Completed the API reference documentation

Beta 0.9.1

  • Standarized the API JSON responses
  • Added api_sample.py to demonstate how to use pyvfeed in API mode
  • Cleaned the code
  • Reflected the changes in documentation

Beta 0.9 - Initial release

  • First commit
  • Sources dataset in concordance with vFeed IO Patent.
  • Support to Amazon S3 Boto3
  • Export to JSON & YAML
  • Added documentation