GCVE - Software

GCVE BCP defines different standards that are implemented in open-source software to support GCVE publication processes and operations.

Software

Reference Software Implementation of the GCVE Standard

The Vulnerability-Lookup software is a powerful open-source sharing platform that assists security teams, researchers, and system administrators in identifying, tracking, and publishing vulnerabilities. Vulnerability-Lookup implements all the required GCVE BCP standards to operate a GNA.

Details

Software Supporting the GCVE BCP Standards

BCP-07 Known Exploited Vulnerability (KEV)

Python script that downloads the CISA Known Exploited Vulnerabilities (KEV) Catalog/ENISA CNW EUVD KEV (CSV) and converts each entry into a GCVE-BCP-07 Known Exploited Vulnerability (KEV) Assertion JSON object.

The goal is to transform a list-based KEV feed into attributable, structured exploitation assertions suitable for ingestion into GCVE-compatible systems, vulnerability databases, or analytical pipelines.

Details

GCVE BCP Validators and Schemas

This repository contains validators and JSON Schemas for GCVE Best Current Practices (BCPs).

Its goal is to provide practical, implementation-oriented tooling to help producers, consumers, and integrators validate GCVE-related data structures in a consistent and interoperable way.

Details

Client for the Global CVE Allocation System

Python

This gcve client can be integrated into software such as Vulnerability-Lookup to provide core GCVE functionalities by adhering to the Best Current Practices and provides a command-line to query the GCVE GNA directory.

Details