CVE Api is a parse & filter the latest CVEs from cve.mitre.org.
Usage
http://localhost:4000/cve?target=KEYWORD
The year parameter is optional.
http://localhost:4000/cve?target=KEYWORD&year=YEAR
Examples
http://localhost:4000/cve?target=ruby%20on%20rails
http://localhost:4000/cve?target=ruby%20on%20rails&year=2020
If you want to parse the latest year, use the “latest” keyword.http://localhost:4000/cve?target=ruby%20on%20rails&year=latest
Also Read – Fuzzowski : The Network Protocol Fuzzer
Getting Started
bundle install
ruby rest.rb
Requirements
Environment
config/environment.rb
Healthcheck
http://localhost:4000/status
Manage Image
Access
Build Image
docker build . -t cve-api
Run Image
docker run -p 4000:4000 -d cve-api
Get id
docker ps
Stop image
docker stop ID
Remove image
docker rmi cve-api
Dive into the world of cybersecurity with GoHTools, a comprehensive collection of hacking utilities crafted…
DefGen allows you to create your personalized HTML defacing webpage pre-integrated with CSS and JavaScript.…
Dive into the world of colorlight-riscv-rs, where we embark on an exciting journey to manipulate…
This is a diverse collection of scripts used for OSINT, ethical hacking, and web application…
A tool crafted with simplicity in mind but harboring its own set of flaws. Despite…
CyberSentry is a robust automated scanning tool designed for web applications. It helps security professionals, ethical…