CVE Api is a parse & filter the latest CVEs from cve.mitre.org.
Usage
http://localhost:4000/cve?target=KEYWORD
The year parameter is optional.
http://localhost:4000/cve?target=KEYWORD&year=YEAR
Examples
http://localhost:4000/cve?target=ruby%20on%20rails
http://localhost:4000/cve?target=ruby%20on%20rails&year=2020
If you want to parse the latest year, use the “latest” keyword.http://localhost:4000/cve?target=ruby%20on%20rails&year=latest
Also Read – Fuzzowski : The Network Protocol Fuzzer
Getting Started
bundle installruby rest.rbRequirements
Environment
config/environment.rbHealthcheck
http://localhost:4000/statusManage Image
Access
Build Image
docker build . -t cve-api
Run Image
docker run -p 4000:4000 -d cve-api
Get id
docker ps
Stop image
docker stop ID
Remove image
docker rmi cve-api
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…