@@ -9,4 +9,94 @@ toc: true
9
9
10
10
Vulnerability-Lookup not only retrieves vulnerability information from various sources
11
11
(such as NIST, PySec, and GitHub) but also connects related vulnerabilities, exploits,
12
- affected software, sightings, and other relevant metadata (Vulnrichment, CISA KEV).
12
+ affected software, sightings, and other relevant metadata (Vulnrichment, CISA KEV).
13
+
14
+
15
+ Related vulnerabilities are located in the container `` vulnerability-lookup:linked `` :
16
+
17
+ ``` bash
18
+ $ curl --silent ' https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?with_linked=true' | jq ' keys'
19
+ [
20
+ " containers" ,
21
+ " cveMetadata" ,
22
+ " dataType" ,
23
+ " dataVersion" ,
24
+ " vulnerability-lookup:linked"
25
+ ]
26
+
27
+ ```
28
+
29
+ The correlations is based on the various sources used by the Vulnerability-Lookup installation:
30
+
31
+ ``` bash
32
+ $ curl --silent ' https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?with_linked=true' | jq ' .["vulnerability-lookup:linked"] | keys'
33
+ [
34
+ " fkie_nvd" ,
35
+ " github" ,
36
+ " gsd" ,
37
+ " variot"
38
+ ]
39
+ ```
40
+
41
+ You can easily get related vulnerabilities from a specific source:
42
+
43
+ ``` bash
44
+ $ curl --silent ' https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?with_linked=true' | jq ' .["vulnerability-lookup:linked"]["github"]'
45
+ [
46
+ [
47
+ " ghsa-x629-5xff-w7qg" ,
48
+ {
49
+ " schema_version" : " 1.4.0" ,
50
+ " id" : " GHSA-x629-5xff-w7qg" ,
51
+ " modified" : " 2025-01-06T15:30:58Z" ,
52
+ " published" : " 2022-05-17T03:11:58Z" ,
53
+ " aliases" : [
54
+ " CVE-2015-2051"
55
+ ],
56
+ " details" : " The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface." ,
57
+ " severity" : [
58
+ {
59
+ " type" : " CVSS_V3" ,
60
+ " score" : " CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
61
+ }
62
+ ],
63
+ " affected" : [],
64
+ " references" : [
65
+ {
66
+ " type" : " ADVISORY" ,
67
+ " url" : " https://nvd.nist.gov/vuln/detail/CVE-2015-2051"
68
+ },
69
+ {
70
+ " type" : " WEB" ,
71
+ " url" : " https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10282"
72
+ },
73
+ {
74
+ " type" : " WEB" ,
75
+ " url" : " https://www.exploit-db.com/exploits/37171"
76
+ },
77
+ {
78
+ " type" : " WEB" ,
79
+ " url" : " http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051"
80
+ },
81
+ {
82
+ " type" : " WEB" ,
83
+ " url" : " http://www.securityfocus.com/bid/72623"
84
+ },
85
+ {
86
+ " type" : " WEB" ,
87
+ " url" : " http://www.securityfocus.com/bid/74870"
88
+ }
89
+ ],
90
+ " database_specific" : {
91
+ " cwe_ids" : [
92
+ " CWE-77"
93
+ ],
94
+ " severity" : " HIGH" ,
95
+ " github_reviewed" : false,
96
+ " github_reviewed_at" : null,
97
+ " nvd_published_at" : " 2015-02-23T17:59:00Z"
98
+ }
99
+ }
100
+ ]
101
+ ]
102
+ ```
0 commit comments