CVE Api is a parse & filter the latest CVEs from cve.mitre.org.
Usage
http://localhost:4000/cve?target=KEYWORD
The year parameter is optional.
http://localhost:4000/cve?target=KEYWORD&year=YEAR
Examples
http://localhost:4000/cve?target=ruby%20on%20rails
http://localhost:4000/cve?target=ruby%20on%20rails&year=2020
If you want to parse the latest year, use the “latest” keyword.http://localhost:4000/cve?target=ruby%20on%20rails&year=latest
Also Read – Fuzzowski : The Network Protocol Fuzzer
Getting Started
bundle installruby rest.rbRequirements
Environment
config/environment.rbHealthcheck
http://localhost:4000/statusManage Image
Access
Build Image
docker build . -t cve-api
Run Image
docker run -p 4000:4000 -d cve-api
Get id
docker ps
Stop image
docker stop ID
Remove image
docker rmi cve-api
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…