Skip to content
Unofficial api for cve.mitre.org
Ruby Other
  1. Ruby 99.6%
  2. Other 0.4%
Branch: master
Clone or download

Latest commit

Fetching latest commit…
Cannot retrieve the latest commit at this time.

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github/workflows
assets
cache Added cache folder Feb 16, 2020
config
env
sorbet
src
views
.dockerignore
.gitignore
.rubocop.yml
.whitesource
Dockerfile
Gemfile
Gemfile.lock
README.md
rest.rb

README.md

name

Parse & filter the latest CVEs from https://cve.mitre.org

Docs

Usage

http://localhost:4000/cve?target=KEYWORD

The year parameter is optional.
http://localhost:4000/cve?target=KEYWORD&year=YEAR

Examples

http://localhost:4000/cve?target=ruby%20on%20rails
terminal browser

http://localhost:4000/cve?target=ruby%20on%20rails&year=2020

If you want to parse the latest year, use the "latest" keyword.
http://localhost:4000/cve?target=ruby%20on%20rails&year=latest

Getting started

  • Download the project
  • bundle install
  • ruby rest.rb

Requirements

  • Ruby
  • Docker (Optional, only required if you want to run through a container.)

Environment

You can switch between prod & dev at config/environment.rb
You need to create one yourself, an example can be found here.

Healthcheck

The url will return a status code of 200 which means the api is healthy.
If 200 is not shown then you should assume there is something wrong.
http://localhost:4000/status

Manage image

Access

You can access the api via http://localhost:4000/
You should be able to view the index page from the url. index

Build image

docker build . -t cve-api

Run image

docker run -p 4000:4000 -d cve-api

Get id

docker ps

Stop image

docker stop ID

Remove image

docker rmi cve-api

You can’t perform that action at this time.