Skip to content

Vendors API

GET /categories

List the categories.

Parameters:

  • page (optional, default: 1): the page to start

Example request:

GET /api/categories HTTP/1.1
Host: example.com
Accept: application/json

Example response:

HTTP/1.1 200 OK
[
  ...
  {
    "name": "intranet",
    "human_name": "Intranet"
  },
  ...
]

GET /categories/<string:name>

Get a specific category.

Example request:

GET /api/categories/intranet HTTP/1.1
Host: example.com
Accept: application/json

Example response:

HTTP/1.1 200 OK
{
  "name": "intranet",
  "human_name": "Intranet",
  "products": [
    "bulletproof-security",
    "enterprise_linux_server",
    "windows_server_2012",
    "windows_server_2016"
    ],
  "vendors": [
    "microsoft"
  ]
}

GET /categories/<string:name>/cve

Get the list of CVEs associated to a category.

Parameters:

  • criticality (optional): filter by CVSS (from 0.0 to 10.0)
  • period (optional, default: 30): the period in days

Example request:

GET /api/categories/intranet/cve HTTP/1.1
Host: example.com
Accept: application/json

Example response:

HTTP/1.1 200 OK
[
  ...
  {
    "id": "CVE-2022-28148",
    "summary": "The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.",
    "created_at": "2022-03-29T13:15:00Z",
    "updated_at": "2022-04-04T20:26:00Z"
  },
  ...
]