1 回答

TA貢獻1834條經驗 獲得超8個贊
最好將其用作 DataFrame,然后您可以對列進行過濾:
keyword = 'oracle'
url = 'https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword={}'.format(keyword)
html_data = requests.get(url).text
df = pd.read_html(html_data)
df = df[2]
df['Year'] = df['Name'].str.split('-').str[1].astype(int)
df = df[df['Year']>2016]
print(df)
Name Description Year
0 CVE-2020-9402 Django 1.11 before 1.11.29, 2.2 before 2.2.11,... 2020
1 CVE-2020-9315 ** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Orac... 2020
2 CVE-2020-9314 ** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Orac... 2020
3 CVE-2020-8428 fs/namei.c in the Linux kernel before 5.5 has ... 2020
4 CVE-2020-7221 mysql_install_db in MariaDB 10.4.7 through 10.... 2020
... ... ... ...
2632 CVE-2017-10001 Vulnerability in the Oracle Hospitality Simpho... 2017
2633 CVE-2017-1000030 Oracle, GlassFish Server Open Source Edition 3... 2017
2634 CVE-2017-1000029 Oracle, GlassFish Server Open Source Edition 3... 2017
2635 CVE-2017-1000028 Oracle, GlassFish Server Open Source Edition 4... 2017
2636 CVE-2017-10000 Vulnerability in the Oracle Hospitality Report... 2017
添加回答
舉報