This project is a CVE Report Generator built using Flask, Python, and several external libraries. It allows users to search for specific CVE IDs and generates detailed reports in various formats such as PDF, DOCX, HTML, and Markdown (MD). The reports include vulnerability descriptions, CVSS scores, severity ratings, exploit links, and references to external sources.
📦 project_directory
┣ 📂 static
┃ ┣ 📂 bootstrap
┃ ┣ 📂 css
┃ ┗ 📂 sass
┣ 📂 templates
┃ ┣ 📜 index.html
┃ ┣ 📜 result.html
┃ ┗ 📜 layout.html
┣ 📜 app.py
┣ 📜 downloader.py
┣ 📜 fetch_exploit.py
┣ 📜 validator.py
┣ 📜 requirements.txt
┗ 📜 .env
git clone https://github.com/cyberprogramming1/CVE-Report-Generator.git
pip install -r requirements.txt
SECRET_KEY=<your_flask_secret_key>
NIST_API_KEY=<your_nist_api_key>
python app.py
http://127.0.0.1:5000/
- CVE Search: Input a CVE ID to get detailed information about the vulnerability.
- Report Generation: Export CVE details into PDF, DOCX, HTML, or Markdown files.
- Exploit Links: Fetch exploit links related to the CVE from Exploit-DB.
- External References: The application opens up to three top references containing technical details about the CVE.
- Enter a valid CVE ID in the search form.
- Click "Submit" to fetch data from the NVD and MITRE databases.
- View the detailed report, including description, CVSS score, severity, affected vendors, and external references.
- Download the report in your preferred format (PDF, DOCX, HTML, or MD).
Here is an example of the workflow:
- Input: CVE-2023-XXXX
- Output: The application fetches data such as vulnerability description, affected vendors, CVSS metrics, and relevant exploit links. Dependencies
- Flask
- FPDF
- python-docx
- requests
- BeautifulSoup
- markdown
- dotenv
- Selenium
- Raul
- Mahmud
- Ilaha
- Aynura