Vendors¶
Resource | Operation | Description |
---|---|---|
Vendors | GET /vendors | Get the list of vendors. |
GET /vendors/(string:name)/cve | Get the list of CVE associated to a vendor. | |
GET /vendors/(string:name) | Get a specific vendor. |
-
GET
/vendors
¶ Get the list of vendors.
Example request:
GET /vendors HTTP/1.1 Host: api.saucs.com Accept: application/json
Example response:
HTTP/1.1 200 OK Vary: Accept Content-Type: application/json [ { "human_name": "Openbsd", "name": "openbsd" }, { "human_name": "Redhat", "name": "redhat" } ]
Query Parameters: - page – page number. default is 1
Response Headers: - Content-Type – application/json
Status Codes: - 200 OK – list of vendors found
-
GET
/vendors/
(string: name)/cve
¶ Get the list of CVE associated to a vendor.
Example request:
GET /vendors/sun/cve HTTP/1.1 Host: api.saucs.com Accept: application/json
Example response:
HTTP/1.1 200 OK Vary: Accept Content-Type: application/json [ { "created_at": "2007-04-16 22:19:00Z", "name": "CVE-2007-2045", "summary": "Unspecified vulnerability in the IP implementation in Sun Solaris 8 and 9 allows remote attackers to cause a denial of service (CPU consumption) via crafted IP packets, probably related to fragmented packets with duplicate or missing fragments.", "updated_at": "2017-10-11 01:32:05Z" }, { "created_at": "2007-04-19 10:19:00Z", "name": "CVE-2007-1681", "summary": "Format string vulnerability in libwebconsole_services.so in Sun Java Web Console 2.2.2 through 2.2.5 allows remote attackers to cause a denial of service (application crash), obtain sensitive information, and possibly execute arbitrary code via unspecified vectors during a failed login attempt, related to syslog.", "updated_at": "2017-10-11 01:31:56Z" } ]
Query Parameters: - page – page number. default is 1
Response Headers: - Content-Type – application/json
Status Codes: - 200 OK – list of CVE found
-
GET
/vendors/
(string: name)¶ Get a specific vendor.
Example request:
GET /vendors/sun HTTP/1.1 Host: api.saucs.com Accept: application/json
Example response:
HTTP/1.1 200 OK Vary: Accept Content-Type: application/json { "human_name": "Sun", "name": "sun", "products": [ "blade_6000_modular_system_with_chassis", "blade_6048_modular_system_with_chassis", "blade_8000_modular_system", "...", "sunos", "sunvts", "virtual_desktop_infrastructure", "virtualbox", "wbem_services", "web-based_enterprise_management", "wireless_toolkit", "woodstock", "workshop", "xvm_virtualbox" ] }
Response Headers: - Content-Type – application/json
Status Codes: - 200 OK – vendor found
- 404 Not Found – vendor not found