🔐
Sentnl
  • Stay Secure
  • SSH
    • Bash History
  • Git
    • GitHub credential caching no no
    • Removing your GitHub commit history
  • Community
    • Tips on identifying scammers on Telegram
  • Linux security
    • Install Wiregaurd on Ubuntu 18.04
    • Ubuntu automated security updates
  • Hacking Demos
    • Getting passwords of logged in users
  • Wordpress Remote Code Execution
  • Grafana SSRF exploit
  • CVE Query API Examples
    • Wordpress + plugins CVE query
    • Hyperion CVE Query
    • Atomic API CVE query
Powered by GitBook
On this page

Was this helpful?

  1. CVE Query API Examples

Hyperion CVE Query

An example Hyperion CVE query to list all the vulnerabilities associated with the Hyperion stack.

curl -X POST -H "Content-Type: application/json" \
-d '[
{ "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:elastic:elasticsearch:7.10.1:*:*:*:*:*:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } },
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:pivotal_software:rabbitmq:3.8.0:-:*:*:*:*:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } },
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:elastic:kibana:7.10.1:*:*:*:*:*:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:redislabs:redis:5.0.9:*:*:*:*:*:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:fastify:fastify:2.14.1:*:*:*:*:node.js:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:lodash:lodash:4.17.12:*:*:*:*:node.js:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:momentjs:moment:2.27.0:*:*:*:*:node.js:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:node-fetch_project:node-fetch:3.0.0:beta8:*:*:*:node.js:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:socket:engine.io-client:2.3.0:*:*:*:*:node.js:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } ,
              { "retrieve": "cves", "dict_filter": { "vulnerable_configuration": "cpe:2.3:a:yargs:yargs-parser:15.4.1:*:*:*:*:node.js:*:*" }, "limit": 10, "query_filter": { "access": 0, "cwe": 0, "vulnerable_configuration": 0, "vulnerable_product": 0 } } 
]' \
https://vuln.sentnl.io/api/query
PreviousWordpress + plugins CVE queryNextAtomic API CVE query

Last updated 4 years ago

Was this helpful?