Web scraping Tool for vulnerability reporting

Difficulty in staying updated in critical and high severity vulnerabilities of OEM equipments

Description

This project aims to provide an automated and centralized solution for tracking and staying updated on critical and high-severity vulnerabilities in OEM equipment. It aggregates vulnerability data from various sources, including vendor security advisories, CVE databases (NVD, MITRE), and threat intelligence feeds. The project helps organizations manage risk, automate vulnerability alerts, and streamline patch management for OEM devices.

## Live Demo

You can view the live website here: https://keerthana-jd.github.io/Secuweb/

(If website can't viewed, Kindly click on URL present in my Github secuweb repository in About section)

##How to use secuweb

1. Open the index.html file in your web browser or search the URL https://keerthana-jd.github.io/Secuweb/ in Browser.

2. Enter your email and password in the login form. - Click the "Login" button.

3. Once logged in, you will see the vulnerability search interface. - Enter the CVE ID, OEM name, and/or severity level in the respective input fields. - Click the "Search" button. - The search results will be displayed below the search form.

4. Enter your email address in the "Email Notifications" form. - Click the "Notify Me" button. - A simulated notification message will be displayed. - (Note: This is a simulation. A real application would send an actual email.)

## Technical Details -

**Frontend:** HTML, CSS, and JavaScript.

- **Data Source:** National Vulnerability Database (NVD) .

- **Functionality:** - The JavaScript code handles the login, search, and notification functionalities. - The search() function fetches vulnerability data from the NVD and displays the results. - The notifyMe() function simulates sending an email notification.

Issues & Pull Requests Thread
No issues or pull requests added.