@@ -104,4 +104,101 @@ $ curl --silent 'https://vulnerability.circl.lu/api/vulnerability/CVE-2015-2051?
104
104
```
105
105
106
106
107
- ### Sightings
107
+ ### Sightings
108
+
109
+ You can explore the relationships between sightings and vulnerabilities through the graphical interface.
110
+
111
+ [ ![ alt text] ( /images/user-manual/sightings/correlations.png )] ( /images/user-manual/sightings/correlations.png )
112
+
113
+ Or by using the API as explained in the next section.
114
+
115
+ #### Retrieving vulnerability sightings
116
+
117
+ ``` bash
118
+ $ curl --silent ' https://vulnerability.circl.lu/api/vulnerability/CVE-2024-5261?with_sightings=true' | jq ' .["vulnerability-lookup:sightings"]'
119
+ [
120
+ {
121
+ " uuid" : " eec2c8fd-f664-4e73-b3f5-651db5fa4f3f" ,
122
+ " vulnerability_lookup_origin" : " 1a89b78e-f703-45f3-bb86-59eb712668bd" ,
123
+ " author" : " 9f56dd64-161d-43a6-b9c3-555944290a09" ,
124
+ " vulnerability" : " cve-2024-5261" ,
125
+ " type" : " seen" ,
126
+ " source" : " https://mastodon.social/users/bagder/statuses/113984646246260950" ,
127
+ " creation_timestamp" : " 2025-02-11T09:54:37.066650Z"
128
+ },
129
+ {
130
+ " uuid" : " 6de72384-c623-4e70-bd38-1040c4e29bab" ,
131
+ " vulnerability_lookup_origin" : " 1a89b78e-f703-45f3-bb86-59eb712668bd" ,
132
+ " author" : " 9f56dd64-161d-43a6-b9c3-555944290a09" ,
133
+ " vulnerability" : " cve-2024-5261" ,
134
+ " type" : " seen" ,
135
+ " source" : " https://bsky.app/profile/bagder.mastodon.social.ap.brid.gy/post/3lhvfc2enwhl2" ,
136
+ " creation_timestamp" : " 2025-02-11T10:04:50.326511Z"
137
+ },
138
+ {
139
+ " uuid" : " 61f4c902-4258-423a-929a-4b473e3d16a0" ,
140
+ " vulnerability_lookup_origin" : " 1a89b78e-f703-45f3-bb86-59eb712668bd" ,
141
+ " author" : " 9f56dd64-161d-43a6-b9c3-555944290a09" ,
142
+ " vulnerability" : " CVE-2024-5261" ,
143
+ " type" : " seen" ,
144
+ " source" : " https://daniel.haxx.se/blog/2025/02/11/disabling-cert-checks-we-have-not-learned-much/" ,
145
+ " creation_timestamp" : " 2025-02-11T14:00:07.000000Z"
146
+ }
147
+ ]
148
+ ```
149
+
150
+ #### Finding correlations with other vulnerabilities
151
+
152
+ ``` bash
153
+ $ curl --silent ' https://vulnerability.circl.lu/api/sighting/?source=https://daniel.haxx.se/blog/2025/02/11/disabling-cert-checks-we-have-not-learned-much/' | jq ' .data[].vulnerability'
154
+ " GHSA-fq29-72jg-5hrj"
155
+ " CVE-2024-32928"
156
+ " GHSA-9mgx-552f-59p6"
157
+ " CVE-2024-56521"
158
+ " GHSA-crg3-fjm2-xvpq"
159
+ " CVE-2024-5261"
160
+ ```
161
+
162
+ ``` bash
163
+ $ curl --silent ' https://vulnerability.circl.lu/api/vulnerability/CVE-2024-32928?with_linked=true' | jq ' .["vulnerability-lookup:linked"]["github"]'
164
+ [
165
+ [
166
+ " ghsa-fq29-72jg-5hrj" ,
167
+ {
168
+ " schema_version" : " 1.4.0" ,
169
+ " id" : " GHSA-fq29-72jg-5hrj" ,
170
+ " modified" : " 2024-08-20T18:31:21Z" ,
171
+ " published" : " 2024-08-19T18:32:07Z" ,
172
+ " aliases" : [
173
+ " CVE-2024-32928"
174
+ ],
175
+ " details" : " The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through." ,
176
+ " severity" : [
177
+ {
178
+ " type" : " CVSS_V3" ,
179
+ " score" : " CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
180
+ }
181
+ ],
182
+ " affected" : [],
183
+ " references" : [
184
+ {
185
+ " type" : " ADVISORY" ,
186
+ " url" : " https://nvd.nist.gov/vuln/detail/CVE-2024-32928"
187
+ },
188
+ {
189
+ " type" : " WEB" ,
190
+ " url" : " https://support.google.com/product-documentation/answer/14771247?hl=en&ref_topic=12974021&sjid=9111851316942032590-NA#zippy="
191
+ }
192
+ ],
193
+ " database_specific" : {
194
+ " cwe_ids" : [],
195
+ " severity" : " MODERATE" ,
196
+ " github_reviewed" : false,
197
+ " github_reviewed_at" : null,
198
+ " nvd_published_at" : " 2024-08-19T17:15:07Z"
199
+ }
200
+ }
201
+ ]
202
+ ]
203
+ ```
204
+
0 commit comments