CVE Finder is a lightweight Python script designed to extract and display information about Common Vulnerabilities and Exposures (CVE). It scrapes CVE details from structured HTML and presents them in a clean, readable format in the terminal. Additionally, it searches GitHub repositories to find related projects, exploits, or research for the given CVE.
✅ CVE Extraction – Parses CVE ID and vulnerability description.
✅ GitHub Repository Lookup – Finds repositories mentioning the CVE (e.g., exploits, patches, PoCs).
✅ Easy-to-Use – Simply provide a CVE number, and the script retrieves relevant details.
git clone https://github.com/ThatNotEasy/CVE-Finder.git
cd CVE-Finder
Before installing dependencies, it's recommended to use a virtual environment (venv).
python -m venv venv
venv\Scripts\activate
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
python main.py -c "CVE_NUMBER"
- Basic Finder: This script is a simple lookup tool and does not fetch live CVE updates.
- GitHub API Rate Limits: Uses unauthenticated GitHub API calls, which may be limited for excessive use.
- No Advanced Analysis: Only extracts information from HTML responses and performs a basic GitHub search.