{"id":16061220,"url":"https://github.com/beyarz/cve-api","last_synced_at":"2025-07-26T16:11:03.315Z","repository":{"id":47503279,"uuid":"239606867","full_name":"Beyarz/Cve-api","owner":"Beyarz","description":"Unofficial api for cve.mitre.org","archived":false,"fork":false,"pushed_at":"2021-08-28T13:37:05.000Z","size":4022,"stargazers_count":41,"open_issues_count":1,"forks_count":7,"subscribers_count":5,"default_branch":"master","last_synced_at":"2024-10-10T04:08:06.757Z","etag":null,"topics":["api","cve","cve-search","dockerfile","parse","real-time","ruby","self-hosted","selfhosted","sinatra"],"latest_commit_sha":null,"homepage":"","language":"Ruby","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Beyarz.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-02-10T20:30:41.000Z","updated_at":"2024-09-21T14:19:18.000Z","dependencies_parsed_at":"2022-09-23T11:02:16.925Z","dependency_job_id":null,"html_url":"https://github.com/Beyarz/Cve-api","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Beyarz%2FCve-api","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Beyarz%2FCve-api/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Beyarz%2FCve-api/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Beyarz%2FCve-api/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Beyarz","download_url":"https://codeload.github.com/Beyarz/Cve-api/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":221697077,"owners_count":16865536,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["api","cve","cve-search","dockerfile","parse","real-time","ruby","self-hosted","selfhosted","sinatra"],"created_at":"2024-10-09T04:08:12.580Z","updated_at":"2024-10-27T15:18:32.834Z","avatar_url":"https://github.com/Beyarz.png","language":"Ruby","readme":"![name](assets/name.png)\n\u003cp align=center\u003eParse \u0026 filter the latest CVEs from https://cve.mitre.org \u003c/p\u003e\n\n## Docs\n\n### Usage\n\n`http://localhost:4000/cve?target=KEYWORD`\n\nThe year parameter is optional.\\\n`http://localhost:4000/cve?target=KEYWORD\u0026year=YEAR`\n\n#### Examples\n\n`http://localhost:4000/cve?target=ruby%20on%20rails`\\\n![terminal](assets/terminal.png)\n![browser](assets/browser.png)\n\n`http://localhost:4000/cve?target=ruby%20on%20rails\u0026year=2020`\n\nIf you want to parse the latest year, use the \"latest\" keyword.\\\n`http://localhost:4000/cve?target=ruby%20on%20rails\u0026year=latest`\n\n## Getting started\n\n- Download the project\n- `bundle install`\n- `ruby rest.rb`\n\n## Requirements\n\n- [Ruby](https://www.ruby-lang.org/en/)\n- [Docker](https://www.docker.com) (Optional, only required if you want to run through a container.)\n\n### Environment\n\nYou can switch between prod \u0026 dev at `config/environment.rb`\\\nYou need to create one yourself, an example can be found [here](config/environment-example.rb).\n\n### Healthcheck\n\nThe url will return a status code of 200 which means the api is healthy.\\\nIf 200 is not shown then you should assume there is something wrong.\\\n`http://localhost:4000/status`\n\n## Manage image\n\n### Access\n\nYou can access the api via \u003chttp://localhost:4000/\u003e \\\nYou should be able to view the index page from the url.\n![index](assets/index.png)\n\n### Build image\n\n`docker build . -t cve-api`\n\n### Run image\n\n`docker run -p 4000:4000 -d cve-api`\n\n### Get id\n\n`docker ps`\n\n### Stop image\n\n`docker stop ID`\n\n#### Remove image\n\n`docker rmi cve-api`\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbeyarz%2Fcve-api","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fbeyarz%2Fcve-api","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbeyarz%2Fcve-api/lists"}