Description:
CVE Checker is a comprehensive CVE scraper that collects CVE-related information from various sources. The project leverages Flask to handle the backend, while employing several libraries to facilitate data scraping, exporting, and document generation.
To run the project, ensure you have the following dependencies installed:
- Flask: Web framework for Python.
- bs4: BeautifulSoup library for web scraping.
- requests: HTTP library for making requests.
- python-docx: Library for creating and editing Word documents.
- selenium: Web testing library for automating web interactions.
- reportlab: Library for generating PDFs.
- docx: Another library for working with Word documents.
-
Set Up a Virtual Environment
It is recommended to use a virtual environment to manage project dependencies. You can create and activate a virtual environment using the following commands:python -m venv venv source venv/bin/activate
-
Install Dependencies With the virtual environment activated, install the necessary dependencies:
pip install Flask bs4 requests python-docx selenium reportlab docx
-
Run the Flask Application Navigate to the project main app.py file and start the Flask server from VS Code (Run button) By default, the server will run at http://127.0.0.1:5000.
- Ali Abbasov (AA): Primarily focused on backend development, including most of the scraping logic. Also contributed to the frontend.
- Rufat Samadov (RS): Initiated the project and set up the Flask framework. Developed the functionality for exporting CVE reports in PDF and Word formats and made contributions to some HTML files.
- Seyid Alibayli (SA): Responsible for Markdown and HTML exports, applied CSS styles, and worked on various HTML markup.
- Nurlan Naghiyev (NN): Led the frontend development, handling HTML, CSS, and JavaScript tasks.