{"id":19909239,"url":"https://github.com/spiderlabs/cve_server","last_synced_at":"2025-08-18T19:34:54.992Z","repository":{"id":2599213,"uuid":"42732121","full_name":"SpiderLabs/cve_server","owner":"SpiderLabs","description":"Simple REST-style web service for the CVE searching","archived":false,"fork":false,"pushed_at":"2023-05-19T18:03:07.000Z","size":226,"stargazers_count":98,"open_issues_count":10,"forks_count":39,"subscribers_count":19,"default_branch":"master","last_synced_at":"2025-05-03T02:39:04.476Z","etag":null,"topics":["api","api-rest","api-server","cpe","cve","cve-server","cvss","cvssv2","cvssv3","database","nvd","ruby"],"latest_commit_sha":null,"homepage":"","language":"Ruby","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/SpiderLabs.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2015-09-18T15:58:25.000Z","updated_at":"2025-03-31T00:50:00.000Z","dependencies_parsed_at":"2023-07-06T06:03:55.144Z","dependency_job_id":null,"html_url":"https://github.com/SpiderLabs/cve_server","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/SpiderLabs/cve_server","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SpiderLabs%2Fcve_server","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SpiderLabs%2Fcve_server/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SpiderLabs%2Fcve_server/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SpiderLabs%2Fcve_server/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/SpiderLabs","download_url":"https://codeload.github.com/SpiderLabs/cve_server/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SpiderLabs%2Fcve_server/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":271049847,"owners_count":24691142,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-08-18T02:00:08.743Z","response_time":89,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["api","api-rest","api-server","cpe","cve","cve-server","cvss","cvssv2","cvssv3","database","nvd","ruby"],"created_at":"2024-11-12T21:14:44.603Z","updated_at":"2025-08-18T19:34:54.944Z","avatar_url":"https://github.com/SpiderLabs.png","language":"Ruby","readme":"# CVEServer\n\nSimple REST-style web service for the CVE searching.\n\n## Requirements\n\n  * [Ruby Version Manager](https://rvm.io)\n  * [Ruby 2.4.x or later version](https://www.ruby-lang.org)\n  * [Bundler](https://bundler.io)\n  * [Mongo DB](https://www.mongodb.org)\n\n## Getting Started\n\n### Install the CVE Server\n\nYou must have running ruby, git, mongodb and nginx in your local machine.\n\n```\ncurl --ssl -s https://raw.githubusercontent.com/SpiderLabs/cve_server/master/scripts/install.sh | bash -\n```\n\n## Using the API\n\n* Search for an specific CVE using its ID\n\n  * http://localhost:port/v1/cve/CVE-2015-3900\n\n* Search for several CVEs\n\n  * http://localhost:port/v1/cves/CVE-2019-14407,CVE-2018-18656\n\n* Search for CVEs related to a CPE without versions\n\n  * http://localhost:port/v1/cpe/apache:spark\n\n  * http://localhost:port/v1/cpe/apache:spark,apache:http_server\n\n* List all the available CPEs with versions\n\n  * http://localhost:port/v1/cpe\n\n* Search for CVEs related to a CPE with versions\n\n  * http://localhost:port/v1/cpe_with_version/samba:samba:4.0.0\n  * http://localhost:port/v1/cpe_with_version/samba:samba:4.0.0,apache:http_server:2.4.4\n  * Don't forget to encode the URI if that has special characters, example:\n    * URI::encode('/v1/cpe_with_version/cisco:ios:15.4%282%29t1')\n\n* List all the available CPEs with versions\n\n  * http://localhost:port/v1/cpe_with_versions\n\n## Additional Information\n\n  * [Deploying the CVE Server with Capistrano and Ngnix](https://github.com/SpiderLabs/cve_server/wiki/Deploying-the-CVE-Server-with-Capistrano-and-Ngnix)\n\n## Other installation method\n\n  1. Clone our repository.\n\n    git clone https://github.com/SpiderLabs/cve_server.git\n\n  2. Install the ruby dependencies.\n\n    bundle install\n\n  3. Configure your database.\n\n    vi config/database.yml\n\n  4. Download, create and populate the database for your environment from the National Vulnerability Database via the NVD CVE/CPE API.\n     Note: The new API service is JSON only.    \n     [NVD API URL](https://services.nvd.nist.gov/rest/json/cves/1.0).\n\n    RACK_ENV=development ./bin/nvd_download_and_seed\n    ** The download may take hours to complete **\n \n  5. Start the server.\n\n    RACK_ENV=development puma\n\n## License\n  CVEServer is released under the [MIT License](https://www.opensource.org/licenses/MIT)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fspiderlabs%2Fcve_server","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fspiderlabs%2Fcve_server","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fspiderlabs%2Fcve_server/lists"}