Open jrmarino opened 3 months ago
query example:
https://services.nvd.nist.gov/rest/json/cves/2.0?cpeName=cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*
response:
{ "resultsPerPage": 1, "startIndex": 0, "totalResults": 1, "format": "NVD_CVE", "version": "2.0", "timestamp": "2024-08-06T04:16:28.640", "vulnerabilities": [ { "cve": { "id": "CVE-2024-35328", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:11.037", "lastModified": "2024-07-19T15:25:50.030", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c." }, { "lang": "es", "value": "libyaml v0.2.5 es vulnerable a DDOS. La función yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-835" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9" } ] } ] } ], "references": [ { "url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c", "source": "cve@mitre.org", "tags": [ "Exploit" ] } ] } } ] }
I should be able to pass the generated CPE and generate a yaml report that rvn can retrieve.
we need the ability to make active CVE's solved. We can show them, but show them solved. the command needs the ability to filter out solved vulnerabilities.
query example:
response:
I should be able to pass the generated CPE and generate a yaml report that rvn can retrieve.