CVE Api is a parse & filter the latest CVEs from cve.mitre.org.
Usage
http://localhost:4000/cve?target=KEYWORD
The year parameter is optional.
http://localhost:4000/cve?target=KEYWORD&year=YEAR
Examples
http://localhost:4000/cve?target=ruby%20on%20rails
http://localhost:4000/cve?target=ruby%20on%20rails&year=2020
If you want to parse the latest year, use the “latest” keyword.http://localhost:4000/cve?target=ruby%20on%20rails&year=latest
Also Read – Fuzzowski : The Network Protocol Fuzzer
Getting Started
bundle install
ruby rest.rb
Requirements
Environment
config/environment.rb
Healthcheck
http://localhost:4000/status
Manage Image
Access
Build Image
docker build . -t cve-api
Run Image
docker run -p 4000:4000 -d cve-api
Get id
docker ps
Stop image
docker stop ID
Remove image
docker rmi cve-api
In the realm of remote desktop management, evilrdp stands out as a powerful tool designed…
wa-tunnel is an innovative tool designed to tunnel TCP data through two WhatsApp accounts, leveraging…
Deepfake apps are sophisticated tools that utilize advanced AI algorithms, particularly Generative Adversarial Networks (GANs),…
Subdominator is a lightweight and fast tool designed for passive subdomain enumeration, primarily used in…
A critical vulnerability, CVE-2025-29927, has recently been identified in the Next.js ecosystem, allowing attackers to…
The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming…