Skip to main content

Python library and command-line utility for Vulners (https://vulners.com)

Project description

Vulners API v3 Python wrapper

Description

Python 2/3 library for the Vulners Database provides search, data retrieval, archive and API's vulnerability scanning for the integration purposes. Create powerful security tools and get access to the world largest security database.

Python version

Library was tested on python2 and python3.

How to install

Package is available with PyPI

You can use pip for the installation

pip install -U vulners

Obtaining Vulners API key

Please, register at Vulners website. Go to the personal menu by clicking on your name in the right top corner. Follow "API KEYS" tab. Generate an API key with scope "api" and use it with the library.

Functions and methods

All the callable methods use Vulners REST API.

Search in database

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
heartbleed_related = vulners_api.search("heartbleed", limit=10)

Get information about document by identificator

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
CVE_2017_14174 = vulners_api.document("CVE-2017-14174")

Get information about multiple documents by identificators

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
CVE_DATA = vulners_api.documentList(["CVE-2017-14174", "CVE-2016-1175"])

Search for the public available exploits

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
wordpress_exploits = vulners_api.searchExploit("wordpress 4.7.0")

Get vulnerabilities and exploits by software name and version

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")

results = vulners_api.softwareVulnerabilities("httpd", "1.3")
exploit_list = results.get('exploit')
vulnerabilities_list = [results.get(key) for key in results if key not in ['info', 'blog', 'bugbounty']]

Get vulnerabilities by CPE product and version string

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")

cpe_results = vulners_api.cpeVulnerabilities("cpe:/a:cybozu:garoon:4.2.1")
cpe_exploit_list = cpe_results.get('exploit')
cpe_vulnerabilities_list = [cpe_results.get(key) for key in cpe_results if key not in ['info', 'blog', 'bugbounty']]

Get references for the vulnerability

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
references = vulners_api.references("CVE-2014-0160")

Get Windows KB superseeding and parentseeding information

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
# Superseeding information will be returned as dict
# with two fields: 'superseeds', 'parentseeds'.
# Superseeds means "what KB are covered by this KB".
# Parentseeds means "what KB are covering this KB".
superseeds = vulners_api.kbSuperseeds("KB4524135")

Get Windows KB updates list and download urls

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
microsoft_updates_for_kb = vulners_api.kbUpdates("KB4524135")
updates_download_links = [update.get('href') for update in microsoft_updates_for_kb]

Score any vulnerability description using Vulners AI

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
text_ai_score = vulners_api.aiScore("My cool vulnerability description")

Get possible query autocompletions

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
possible_autocomplete = vulners_api.autocomplete("heartbleed")

Download whole database collection and work with data locally

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
all_cve = vulners_api.archive("cve")

Audit Windows hosts for installed security KB

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")
win_vulners = vulners_api.kbAudit(os="Windows Server 2012 R2", kb_list=["KB4072650", "KB2959936", "KB2894856", "KB2896496"])
need_2_install_kb = win_vulners['kbMissed']
affected_cve = win_vulners['cvelist']

Audit Linux hosts for vulnerabilities (RPM/DEB based)

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")

# Example for CentOS 7
# You can use it for any RPM based OS
# Execute command: rpm -qa --qf '%{NAME}-%{VERSION}-%{RELEASE}.%{ARCH}\\n'
# Use it as package variable input

centos_vulnerabilities = vulners_api.audit(os= 'centos', os_version= '7', package= ['glibc-common-2.17-157.el7_3.5.x86_64'])
vulnerable_packages = centos_vulnerabilities.get('packages')
missed_patches_ids = centos_vulnerabilities.get('vulnerabilities')
cve_list = centos_vulnerabilities.get('cvelist')
how_to_fix = centos_vulnerabilities.get('cumulativeFix')

# Example for Debian 8
# You can use it for any DEB based OS
# Execute command: dpkg-query -W -f='${Package} ${Version} ${Architecture}\\n'
# Use it as package variable input

debian_vulnerabilities = vulners_api.audit(os= 'debian', os_version= '8', package= ['uno-libs3 4.3.3-2+deb8u7 amd64'])

Download Linux (RPM/DEB based) vulnerability assessment data for local processing

import vulners

vulners_api = vulners.Vulners(api_key="YOUR_API_KEY_HERE")

# Example for CentOS 7
centos_vulnerabilities_data = vulners_api.distributive("CentOS", "7")

Download web application vulnerability detection regex collection

import vulners

vulners_api = vulners.Vulners()

rules = vulners_api.rules()

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vulners-1.5.14.tar.gz (29.1 kB view details)

Uploaded Source

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

vulners-1.5.14-py3-none-any.whl (27.8 kB view details)

Uploaded Python 3

vulners-1.5.14-py2-none-any.whl (27.8 kB view details)

Uploaded Python 2

File details

Details for the file vulners-1.5.14.tar.gz.

File metadata

  • Download URL: vulners-1.5.14.tar.gz
  • Upload date:
  • Size: 29.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.3.0 pkginfo/1.7.0 requests/2.22.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.56.2 CPython/3.8.10

File hashes

Hashes for vulners-1.5.14.tar.gz
Algorithm Hash digest
SHA256 a8765e038eee20a20b0f62097fcce394557543bf7773a0295c775f3b864f7a2e
MD5 cef9614e00eed2f223d6287a4d6d0fd8
BLAKE2b-256 048672412748d0c77149a6dbc0c58e7506ad07ed2696388404fdf2fcb9fabae1

See more details on using hashes here.

File details

Details for the file vulners-1.5.14-py3-none-any.whl.

File metadata

  • Download URL: vulners-1.5.14-py3-none-any.whl
  • Upload date:
  • Size: 27.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.3.0 pkginfo/1.7.0 requests/2.22.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.56.2 CPython/3.8.10

File hashes

Hashes for vulners-1.5.14-py3-none-any.whl
Algorithm Hash digest
SHA256 8b8093c8f0f2177636823cb3165e6b88c856a30a239baf668a3d2ecc8e919120
MD5 eff6900be7d3a055e41041b4cd9fd859
BLAKE2b-256 7c7db46fa7f378fde0455dfab43669ec3225f0438f5115c98ed243c2b3bea89f

See more details on using hashes here.

File details

Details for the file vulners-1.5.14-py2-none-any.whl.

File metadata

  • Download URL: vulners-1.5.14-py2-none-any.whl
  • Upload date:
  • Size: 27.8 kB
  • Tags: Python 2
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.3.0 pkginfo/1.7.0 requests/2.22.0 setuptools/45.2.0 requests-toolbelt/0.9.1 tqdm/4.56.2 CPython/3.8.10

File hashes

Hashes for vulners-1.5.14-py2-none-any.whl
Algorithm Hash digest
SHA256 852e47c365a536d5b24f239dde439fcbf730bb8f4cdf8442cbb1f894b4dc6e31
MD5 44b8b965edff00a8a0543301fa493f37
BLAKE2b-256 c9024905399d128d220f12db8e81f41d84f5ecc09403f7b8b94b8378dd2ef3c1

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page