Rankiteo API (0.0.1-beta)

The Rankiteo API

Download OpenAPI description
Languages
Servers
Mock server
https://apidocs.rankiteo.com/_mock/openapi/
production
https://api.rankiteo.com/

General

Operations

Monitor

Operations

Underwriter

Operations

Vulnerability

Operations

Get all available information for the specified CVE

Request

Information for the specified CVE

Query
cve_idstringrequired

CVE Id (Common Vulnerability and Exposure)

Example: cve_id=CVE-2016-3333
curl -i -X GET \
  'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-describe-cve-id?cve_id=CVE-2016-3333' \
  -H 'apikey: YOUR_API_KEY_HERE'

Responses

Successful response containing information

Bodyapplication/json
refmapobject
vulnerable_configurationArray of objects
vulnerable_configuration_cpe_2_2Array of objects
vulnerable_productArray of strings
msbulletinArray of objects
modifiedstring(date-time)
publishedstring(date-time)
accessobject
assignerstring
capecArray of objects
cvssnumber
impactScorenumber
exploitabilityScorenumber
cvssTimestring(date-time)
cvssVectorstring
cwestring
idstring
impactobject
impact3object
exploitability3object
cvss3number
impactScore3number
exploitabilityScore3number
lastModifiedstring(date-time)
referencesArray of strings
summarystring
Response
application/json
{ "refmap": { "bid": [], "sectrack": [] }, "vulnerable_configuration": [ {}, {} ], "vulnerable_configuration_cpe_2_2": [ {}, {} ], "vulnerable_product": [ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*" ], "msbulletin": [ {} ], "modified": "2024-11-21T02:49:49.193000", "published": "2016-11-10T06:59:02.653000", "access": { "authentication": "NONE", "complexity": "MEDIUM", "vector": "NETWORK" }, "assigner": "secure@microsoft.com", "capec": [ {} ], "cvss": 9.3, "impactScore": 10, "exploitabilityScore": 8.6, "cvssTime": "2024-11-21T02:49:49.193000", "cvssVector": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cwe": "CWE-119", "id": "CVE-2016-3333", "impact": { "availability": "COMPLETE", "confidentiality": "COMPLETE", "integrity": "COMPLETE" }, "impact3": { "availability": "HIGH", "confidentiality": "HIGH", "integrity": "HIGH" }, "exploitability3": { "attackvector": "LOCAL", "attackcomplexity": "LOW", "privilegesrequired": "NONE", "userinteraction": "REQUIRED", "scope": "UNCHANGED" }, "cvss3": 7.8, "impactScore3": 5.9, "exploitabilityScore3": 1.8, "lastModified": "2024-11-21T02:49:49.193000", "references": [ "http://www.securityfocus.com/bid/94009", "http://www.securitytracker.com/id/1037252", "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-134" ], "summary": "The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application" }

Get a list of CVEs related to the product

Request

CVEs related to the product

Query
cpestringrequired

cpe of the product

Example: cpe=cpe:2.3:o:gemteks:wrtm-127acn_firmware:01.01.02.141:*:*:*:*:*:*:*
limitnumber

Limit of response items. Default value is 500

Example: limit=50
curl -i -X GET \
  'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-cve-from-cpe-id?cpe=cpe%3A2.3%3Ao%3Agemteks%3Awrtm-127acn_firmware%3A01.01.02.141%3A*%3A*%3A*%3A*%3A*%3A*%3A*&limit=50' \
  -H 'apikey: YOUR_API_KEY_HERE'

Responses

Successful response containing information

Bodyapplication/jsonArray [
refmapobject
vulnerable_configurationArray of objects
vulnerable_configuration_cpe_2_2Array of strings
vulnerable_productArray of strings
modifiedstring(date-time)
publishedstring(date-time)
accessobject
assignerstring
cvssnumber
impactScorenumber
exploitabilityScorenumber
cvssTimestring(date-time)
cvssVectorstring
cwestring
idstring
impactobject
impact3object
exploitability3object
cvss3number
impactScore3number
exploitabilityScore3number
lastModifiedstring(date-time)
referencesArray of strings
summarystring
]
Response
application/json
[ { "refmap": {}, "vulnerable_configuration": [], "vulnerable_configuration_cpe_2_2": [], "vulnerable_product": [], "modified": "2024-11-21T05:14:40.330000", "published": "2020-09-24T15:15:14.437000", "access": {}, "assigner": "cve@mitre.org", "cvss": 9, "impactScore": 10, "exploitabilityScore": 8, "cvssTime": "2024-11-21T05:14:40.330000", "cvssVector": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "cwe": "CWE-1188", "id": "CVE-2020-24365", "impact": {}, "impact3": {}, "exploitability3": {}, "cvss3": 8.8, "impactScore3": 5.9, "exploitabilityScore3": 2.8, "lastModified": "2024-11-21T05:14:40.330000", "references": [], "summary": "An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine" } ]

Get last n amount of vulnerabilities

Request

Last n amount of vulnerabilities

Query
limitnumber

Limit of response items. Default value is 30

Example: limit=50
curl -i -X GET \
  'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-last?limit=50' \
  -H 'apikey: YOUR_API_KEY_HERE'

Responses

Successful response containing domain information

Bodyapplication/jsonArray [
vulnerable_configuration_cpe_2_2Array of strings
modifiedstring(date-time)
publishedstring(date-time)
assignerstring
cwestring
idstring
impact3object
exploitability3object
cvss3number
impactScore3number
exploitabilityScore3number
lastModifiedstring(date-time)
referencesArray of strings
summarystring
]
Response
application/json
[ { "vulnerable_configuration_cpe_2_2": [], "modified": "2025-01-23T23:15:08.113000", "published": "2025-01-23T23:15:08.113000", "assigner": "cve@mitre.org", "cwe": "Unknown", "id": "CVE-2024-55573", "impact3": {}, "exploitability3": {}, "cvss3": 9.1, "impactScore3": 6, "exploitabilityScore3": 2.3, "lastModified": "2025-01-23T23:15:08.113000", "references": [], "summary": "An issue was discovered in Centreon centreon-web 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, 23.04.x before 23.04.24. A user with high privileges is able to inject SQL into the form used to create virtual metrics" } ]

Get a list of products by vendors

Request

List of products by vendors

Query
vendorstringrequired

Vendor name

Example: vendor=microsoft
curl -i -X GET \
  'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-product-by-vendor?vendor=microsoft' \
  -H 'apikey: YOUR_API_KEY_HERE'

Responses

Successful response containing information

Bodyapplication/json
vendorstring
Example: "microsoft"
productArray of strings
Response
application/json
{ "vendor": "microsoft", "product": [ ".net_core", ".net_core_sdk", ".net_framework" ] }

Get a list of vendors

Request

List of vendors

curl -i -X GET \
  https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-vendors \
  -H 'apikey: YOUR_API_KEY_HERE'

Responses

Successful response containing information

Bodyapplication/json
vendorArray of strings
Response
application/json
{ "vendor": [ "01-scripts", "01generator", "01org" ] }

Get a list of CVEs related to the product

Request

List of CVEs related to the product

Query
productstringrequired

Product name

Example: product=excel
vendorstringrequired

Vendor name

Example: vendor=microsoft
curl -i -X GET \
  'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-search-by-vendor?product=excel&vendor=microsoft' \
  -H 'apikey: YOUR_API_KEY_HERE'

Responses

Successful response containing cve information

Bodyapplication/json
resultsArray of objects
Response
application/json
{ "results": [ {} ] }