Vendors API
GET /categories
List the categories.
Parameters:
page
(optional, default: 1): the page to start
Example request:
GET /api/categories HTTP/1.1
Host: example.com
Accept: application/json
Example response:
HTTP/1.1 200 OK
[
...
{
"name": "intranet",
"human_name": "Intranet"
},
...
]
GET /categories/<string:name>
Get a specific category.
Example request:
GET /api/categories/intranet HTTP/1.1
Host: example.com
Accept: application/json
Example response:
HTTP/1.1 200 OK
{
"name": "intranet",
"human_name": "Intranet",
"products": [
"bulletproof-security",
"enterprise_linux_server",
"windows_server_2012",
"windows_server_2016"
],
"vendors": [
"microsoft"
]
}
GET /categories/<string:name>/cve
Get the list of CVEs associated to a category.
Parameters:
criticality
(optional): filter by CVSS (from0.0
to10.0
)period
(optional, default: 30): the period in days
Example request:
GET /api/categories/intranet/cve HTTP/1.1
Host: example.com
Accept: application/json
Example response:
HTTP/1.1 200 OK
[
...
{
"id": "CVE-2022-28148",
"summary": "The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.",
"created_at": "2022-03-29T13:15:00Z",
"updated_at": "2022-04-04T20:26:00Z"
},
...
]