Skip to content

Commit 406a2b1

Browse files
chg: [user-manual] Added some examples of correlations.
1 parent d5d1ad6 commit 406a2b1

File tree

1 file changed

+91
-1
lines changed
  • content/user-manual/correlations

1 file changed

+91
-1
lines changed

content/user-manual/correlations/index.md

+91-1
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,94 @@ toc: true
99

1010
Vulnerability-Lookup not only retrieves vulnerability information from various sources
1111
(such as NIST, PySec, and GitHub) but also connects related vulnerabilities, exploits,
12-
affected software, sightings, and other relevant metadata (Vulnrichment, CISA KEV).
12+
affected software, sightings, and other relevant metadata (Vulnrichment, CISA KEV).
13+
14+
15+
Related vulnerabilities are located in the container ``vulnerability-lookup:linked``:
16+
17+
```bash
18+
$ curl --silent 'https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?with_linked=true' | jq 'keys'
19+
[
20+
"containers",
21+
"cveMetadata",
22+
"dataType",
23+
"dataVersion",
24+
"vulnerability-lookup:linked"
25+
]
26+
27+
```
28+
29+
The correlations is based on the various sources used by the Vulnerability-Lookup installation:
30+
31+
```bash
32+
$ curl --silent 'https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?with_linked=true' | jq '.["vulnerability-lookup:linked"] | keys'
33+
[
34+
"fkie_nvd",
35+
"github",
36+
"gsd",
37+
"variot"
38+
]
39+
```
40+
41+
You can easily get related vulnerabilities from a specific source:
42+
43+
```bash
44+
$ curl --silent 'https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?with_linked=true' | jq '.["vulnerability-lookup:linked"]["github"]'
45+
[
46+
[
47+
"ghsa-x629-5xff-w7qg",
48+
{
49+
"schema_version": "1.4.0",
50+
"id": "GHSA-x629-5xff-w7qg",
51+
"modified": "2025-01-06T15:30:58Z",
52+
"published": "2022-05-17T03:11:58Z",
53+
"aliases": [
54+
"CVE-2015-2051"
55+
],
56+
"details": "The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.",
57+
"severity": [
58+
{
59+
"type": "CVSS_V3",
60+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
61+
}
62+
],
63+
"affected": [],
64+
"references": [
65+
{
66+
"type": "ADVISORY",
67+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2051"
68+
},
69+
{
70+
"type": "WEB",
71+
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10282"
72+
},
73+
{
74+
"type": "WEB",
75+
"url": "https://www.exploit-db.com/exploits/37171"
76+
},
77+
{
78+
"type": "WEB",
79+
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "http://www.securityfocus.com/bid/72623"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "http://www.securityfocus.com/bid/74870"
88+
}
89+
],
90+
"database_specific": {
91+
"cwe_ids": [
92+
"CWE-77"
93+
],
94+
"severity": "HIGH",
95+
"github_reviewed": false,
96+
"github_reviewed_at": null,
97+
"nvd_published_at": "2015-02-23T17:59:00Z"
98+
}
99+
}
100+
]
101+
]
102+
```

0 commit comments

Comments
 (0)