[Announcement] – New vFeed Python Wrapper 0.7.2 available

    vFeed IO just released a new python wrapper for its vFeed Vulnerability & Threat database. Few enhancements included to comply with some modifications occur in the way Microsoft is distributing its security updates.

    Here is the changelog
    ./vfeedcli.py -m get_ms CVE-2017-0143
    [
      {
        “id”: “ms17-010”, 
        “kb”: “4013389”, 
        “title”: “Security Update for Microsoft Windows SMB Server”, 
      }, 
      {
        “id”: “4013198”, 
        “kb”: “4013198”, 
        “title”: “Security Update”, 
      }, 
      {
        “id”: “4012217”, 
        “kb”: “4012217”, 
        “title”: “Monthly Rollup”, 
      }, 
      {
        “id”: “4012214”, 
        “kb”: “4012214”, 
        “title”: “Security Only”, 
      }, 
      {
        “id”: “4012215”, 
        “kb”: “4012215”, 
        “title”: “Monthly Rollup”, 
      }, 
      {
        “id”: “4012212”, 
        “kb”: “4012212”, 
        “title”: “Security Only”, 
      }, 
      {
        “id”: “4012598”, 
        “kb”: “4012598”, 
        “title”: “Security Update”, 
      }, 
      {
        “id”: “4012213”, 
        “kb”: “4012213”, 
        “title”: “Security Only”, 
      }, 
      {
        “id”: “4012606”, 
        “kb”: “4012606”, 
        “title”: “Security Update”, 
      }, 
      {
        “id”: “4012216”, 
        “kb”: “4012216”, 
        “title”: “Monthly Rollup”, 
      }, 
      {
        “id”: “4013429”, 
        “kb”: “4013429”, 
        “title”: “Security Update”, 
      }
    ]
    • The method get_mskb is deprecated.  Use get_ms instead. It returns both information whenever it is available
    • 14 new NMAP NSE scripts was added. Whenever they are associated with a CVE, the method get_nmap will return the appropriate information. (http://seclists.org/nmap-announce/2017/3). Example:
    ./vfeedcli.py -m get_nmap CVE-2017-1001000
    [
      {
        “family”: “vuln, safe”, 
        “file”: “http-vuln-cve2017-1001000.nse”, 
      }
    ]

    Leave a Comment

    Your email address will not be published. Required fields are marked *