vFeed IO just released a new python wrapper for its vFeed Vulnerability & Threat database. Few enhancements included to comply with some modifications occur in the way Microsoft is distributing its security updates.

Here is the changelog
./vfeedcli.py -m get_ms CVE-2017-0143
[
  {
    “id”: “ms17-010”, 
    “kb”: “4013389”, 
    “title”: “Security Update for Microsoft Windows SMB Server”, 
  }, 
  {
    “id”: “4013198”, 
    “kb”: “4013198”, 
    “title”: “Security Update”, 
  }, 
  {
    “id”: “4012217”, 
    “kb”: “4012217”, 
    “title”: “Monthly Rollup”, 
  }, 
  {
    “id”: “4012214”, 
    “kb”: “4012214”, 
    “title”: “Security Only”, 
  }, 
  {
    “id”: “4012215”, 
    “kb”: “4012215”, 
    “title”: “Monthly Rollup”, 
  }, 
  {
    “id”: “4012212”, 
    “kb”: “4012212”, 
    “title”: “Security Only”, 
  }, 
  {
    “id”: “4012598”, 
    “kb”: “4012598”, 
    “title”: “Security Update”, 
  }, 
  {
    “id”: “4012213”, 
    “kb”: “4012213”, 
    “title”: “Security Only”, 
  }, 
  {
    “id”: “4012606”, 
    “kb”: “4012606”, 
    “title”: “Security Update”, 
  }, 
  {
    “id”: “4012216”, 
    “kb”: “4012216”, 
    “title”: “Monthly Rollup”, 
  }, 
  {
    “id”: “4013429”, 
    “kb”: “4013429”, 
    “title”: “Security Update”, 
  }
]
  • The method get_mskb is deprecated.  Use get_ms instead. It returns both information whenever it is available
  • 14 new NMAP NSE scripts was added. Whenever they are associated with a CVE, the method get_nmap will return the appropriate information. (http://seclists.org/nmap-announce/2017/3). Example:
./vfeedcli.py -m get_nmap CVE-2017-1001000
[
  {
    “family”: “vuln, safe”, 
    “file”: “http-vuln-cve2017-1001000.nse”, 
  }
]