pyExploitDb 0.2.9__tar.gz → 0.2.16__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
File without changes
@@ -1,21 +1,24 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pyExploitDb
3
- Version: 0.2.9
3
+ Version: 0.2.16
4
4
  Summary: An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
5
5
  Home-page: https://github.com/GoVanguard/pyExploitDb
6
6
  Author: Shane William Scott
7
7
  Author-email: sscott@gotham-security.com
8
- License: UNKNOWN
9
- Platform: UNKNOWN
10
8
  Classifier: Development Status :: 5 - Production/Stable
11
9
  Classifier: Intended Audience :: Developers
12
10
  Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
13
11
  Classifier: Programming Language :: Python :: 3.6
12
+ Classifier: Programming Language :: Python :: 3.7
13
+ Classifier: Programming Language :: Python :: 3.8
14
+ Classifier: Programming Language :: Python :: 3.9
15
+ Classifier: Programming Language :: Python :: 3.10
16
+ Classifier: Programming Language :: Python :: 3.11
14
17
  Classifier: Operating System :: OS Independent
15
18
  Description-Content-Type: text/markdown
16
19
  License-File: LICENSE
17
20
 
18
- pyExploitDb (https://govanguard.com)
21
+ pyExploitDb (https://gotham-security.com)
19
22
  ==
20
23
 
21
24
  [![Build Status](https://travis-ci.com/GoVanguard/pyExploitDb.svg?branch=master)](https://travis-ci.com/GoVanguard/pyExploitDb)
@@ -28,7 +31,6 @@ Shane William Scott
28
31
 
29
32
  ## About pyExploitDb
30
33
  An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
31
- Last DB Refresh: 02/24/2023
32
34
 
33
35
  ## Upcoming features
34
36
  > CPE database, indexes and mappings
@@ -61,5 +63,3 @@ Port: 80
61
63
 
62
64
  ## Credits
63
65
  Originally based on fork of cve_searchsploit by Andrea Fioraldi.
64
-
65
-
@@ -1,4 +1,4 @@
1
- pyExploitDb (https://govanguard.com)
1
+ pyExploitDb (https://gotham-security.com)
2
2
  ==
3
3
 
4
4
  [![Build Status](https://travis-ci.com/GoVanguard/pyExploitDb.svg?branch=master)](https://travis-ci.com/GoVanguard/pyExploitDb)
@@ -11,7 +11,6 @@ Shane William Scott
11
11
 
12
12
  ## About pyExploitDb
13
13
  An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
14
- Last DB Refresh: 02/24/2023
15
14
 
16
15
  ## Upcoming features
17
16
  > CPE database, indexes and mappings
@@ -76432,7 +76432,8 @@
76432
76432
  "49174"
76433
76433
  ],
76434
76434
  "CVE-2020-25213": [
76435
- "49178"
76435
+ "49178",
76436
+ "51224"
76436
76437
  ],
76437
76438
  "CVE-2020-29477": [
76438
76439
  "49188"
@@ -77828,5 +77829,323 @@
77828
77829
  ],
77829
77830
  "CVE-2021-37589": [
77830
77831
  "50958"
77832
+ ],
77833
+ "CVE-2022-2591": [
77834
+ "51438"
77835
+ ],
77836
+ "CVE-2022-30076": [
77837
+ "51335"
77838
+ ],
77839
+ "CVE-2022-45297": [
77840
+ "51154"
77841
+ ],
77842
+ "CVE-2022-36664": [
77843
+ "51055"
77844
+ ],
77845
+ "CVE-2022-35583": [
77846
+ "51039"
77847
+ ],
77848
+ "CVE-2022-35543": [
77849
+ "51200"
77850
+ ],
77851
+ "CVE-2022-41441": [
77852
+ "51118"
77853
+ ],
77854
+ "CVE-2022-47076": [
77855
+ "51539"
77856
+ ],
77857
+ "CVE-2022-47075": [
77858
+ "51539"
77859
+ ],
77860
+ "CVE-2022-40319": [
77861
+ "51149"
77862
+ ],
77863
+ "CVE-2022-39195": [
77864
+ "51148"
77865
+ ],
77866
+ "CVE-2020-11798": [
77867
+ "51308"
77868
+ ],
77869
+ "CVE-2023-26692": [
77870
+ "51347"
77871
+ ],
77872
+ "CVE-2024-24747": [
77873
+ "51976"
77874
+ ],
77875
+ "CVE-2023-0744": [
77876
+ "51257"
77877
+ ],
77878
+ "CVE-2023-34927": [
77879
+ "51961"
77880
+ ],
77881
+ "CVE-2024-27620": [
77882
+ "51869"
77883
+ ],
77884
+ "CVE-2022-35919": [
77885
+ "51734"
77886
+ ],
77887
+ "CVE-2023-32751": [
77888
+ "51497"
77889
+ ],
77890
+ "CVE-2023-32750": [
77891
+ "51498"
77892
+ ],
77893
+ "CVE-2023-32749": [
77894
+ "51496"
77895
+ ],
77896
+ "CVE-2022-40946": [
77897
+ "51053"
77898
+ ],
77899
+ "CVE-2022-41333": [
77900
+ "51326"
77901
+ ],
77902
+ "CVE-2023-24709": [
77903
+ "51356"
77904
+ ],
77905
+ "CVE-2022-46770": [
77906
+ "51157"
77907
+ ],
77908
+ "CVE-2023-36355": [
77909
+ "51561"
77910
+ ],
77911
+ "CVE-2023-30350": [
77912
+ "51414"
77913
+ ],
77914
+ "CVE-2023-26609": [
77915
+ "51294"
77916
+ ],
77917
+ "CVE-2022-45701": [
77918
+ "51269"
77919
+ ],
77920
+ "CVE-2022-46552": [
77921
+ "51243"
77922
+ ],
77923
+ "CVE-2020-5330": [
77924
+ "51248"
77925
+ ],
77926
+ "CVE-2019-15993": [
77927
+ "51248"
77928
+ ],
77929
+ "CVE-2023-0830": [
77930
+ "51266"
77931
+ ],
77932
+ "CVE-2024-27356": [
77933
+ "51942"
77934
+ ],
77935
+ "CVE-2022-28171": [
77936
+ "51607"
77937
+ ],
77938
+ "CVE-2023-6538": [
77939
+ "51915"
77940
+ ],
77941
+ "CVE-2023-3710": [
77942
+ "51885"
77943
+ ],
77944
+ "CVE-2022-44149": [
77945
+ "51195"
77946
+ ],
77947
+ "CVE-2023-25187": [
77948
+ "51535"
77949
+ ],
77950
+ "CVE-2023-27823": [
77951
+ "51444"
77952
+ ],
77953
+ "CVE-2023-27100": [
77954
+ "51352"
77955
+ ],
77956
+ "CVE-2023-48974": [
77957
+ "51963"
77958
+ ],
77959
+ "CVE-2023-29849": [
77960
+ "51378"
77961
+ ],
77962
+ "CVE-2023-29848": [
77963
+ "51377"
77964
+ ],
77965
+ "CVE-2023-0943": [
77966
+ "51280"
77967
+ ],
77968
+ "CVE-2023-46022": [
77969
+ "51912"
77970
+ ],
77971
+ "CVE-2023-31698": [
77972
+ "51476"
77973
+ ],
77974
+ "CVE-2023-38836": [
77975
+ "51741"
77976
+ ],
77977
+ "CVE-2022-3552": [
77978
+ "51108"
77979
+ ],
77980
+ "CVE-2023-36163": [
77981
+ "51581"
77982
+ ],
77983
+ "CVE-2022-35155": [
77984
+ "51054"
77985
+ ],
77986
+ "CVE-2023-39362": [
77987
+ "51740"
77988
+ ],
77989
+ "CVE-2022-46169": [
77990
+ "51166"
77991
+ ],
77992
+ "CVE-2022-2846": [
77993
+ "51241"
77994
+ ],
77995
+ "CVE-2023-39115": [
77996
+ "51656"
77997
+ ],
77998
+ "CVE-2023-31714": [
77999
+ "51383"
78000
+ ],
78001
+ "CVE-2023-24787": [
78002
+ "51319"
78003
+ ],
78004
+ "CVE-2023-31699": [
78005
+ "51477"
78006
+ ],
78007
+ "CVE-2023-25440": [
78008
+ "51478"
78009
+ ],
78010
+ "CVE-2022-48110": [
78011
+ "51260"
78012
+ ],
78013
+ "CVE-2023-4708": [
78014
+ "51729"
78015
+ ],
78016
+ "CVE-2023-7137": [
78017
+ "51880"
78018
+ ],
78019
+ "CVE-2023-29809": [
78020
+ "51422"
78021
+ ],
78022
+ "CVE-2023-3244": [
78023
+ "51809"
78024
+ ],
78025
+ "CVE-2023-3244)": [
78026
+ "51809"
78027
+ ],
78028
+ "CVE-2023-29983": [
78029
+ "51417"
78030
+ ],
78031
+ "CVE-2021-46360": [
78032
+ "51060"
78033
+ ],
78034
+ "CVE-2022-44877": [
78035
+ "51250"
78036
+ ],
78037
+ "CVE-2023-4407": [
78038
+ "51701"
78039
+ ],
78040
+ "CVE-2023-37759": [
78041
+ "51688"
78042
+ ],
78043
+ "CVE-2024-24496": [
78044
+ "51954"
78045
+ ],
78046
+ "CVE-2024-24495": [
78047
+ "51953"
78048
+ ],
78049
+ "CVE-2024-24494": [
78050
+ "51952"
78051
+ ],
78052
+ "CVE-2024-25832": [
78053
+ "51868"
78054
+ ],
78055
+ "CVE-2024-25830": [
78056
+ "51868"
78057
+ ],
78058
+ "CVE-2022-24632": [
78059
+ "51145"
78060
+ ],
78061
+ "CVE-2022-24630": [
78062
+ "51145"
78063
+ ],
78064
+ "CVE-2022-24629": [
78065
+ "51145"
78066
+ ],
78067
+ "CVE-2022-24627": [
78068
+ "51145"
78069
+ ],
78070
+ "CVE-2022-28368": [
78071
+ "51270"
78072
+ ],
78073
+ "CVE-2023-37569": [
78074
+ "51673"
78075
+ ],
78076
+ "CVE-2022-3141": [
78077
+ "51043"
78078
+ ],
78079
+ "CVE-2023-30868": [
78080
+ "51507"
78081
+ ],
78082
+ "CVE-2023-0455": [
78083
+ "51492"
78084
+ ],
78085
+ "CVE-2023-39147": [
78086
+ "51639"
78087
+ ],
78088
+ "CVE-2023-39796": [
78089
+ "51985"
78090
+ ],
78091
+ "CVE-2023-30256": [
78092
+ "51465"
78093
+ ],
78094
+ "CVE-2023-34635": [
78095
+ "51610"
78096
+ ],
78097
+ "CVE-2023-37269": [
78098
+ "51591"
78099
+ ],
78100
+ "CVE-2022-4395": [
78101
+ "51959"
78102
+ ],
78103
+ "CVE-2023-2636": [
78104
+ "51632"
78105
+ ],
78106
+ "CVE-2023-3452)": [
78107
+ "51826"
78108
+ ],
78109
+ "CVE-2022-4953": [
78110
+ "51716"
78111
+ ],
78112
+ "CVE-2023-2796": [
78113
+ "51658"
78114
+ ],
78115
+ "CVE-2023-3219": [
78116
+ "51659"
78117
+ ],
78118
+ "CVE-2023-4278": [
78119
+ "51735"
78120
+ ],
78121
+ "CVE-2023-37979": [
78122
+ "51644"
78123
+ ],
78124
+ "CVE-2020-11027": [
78125
+ "51531"
78126
+ ],
78127
+ "CVE-2021-24499": [
78128
+ "51510"
78129
+ ],
78130
+ "CVE-2022-1565": [
78131
+ "51122"
78132
+ ],
78133
+ "CVE-2022-4297": [
78134
+ "51560"
78135
+ ],
78136
+ "CVE-2022-25148": [
78137
+ "51711"
78138
+ ],
78139
+ "CVE-2023-3320": [
78140
+ "51533"
78141
+ ],
78142
+ "CVE-2022-48177": [
78143
+ "51346"
78144
+ ],
78145
+ "CVE-2022-48178": [
78146
+ "51345"
78147
+ ],
78148
+ "CVE-2022-48197": [
78149
+ "51198"
77831
78150
  ]
77832
78151
  }