The Rankiteo API
The Rankiteo API
curl -i -X GET \
'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-describe-cve-id?cve_id=CVE-2016-3333' \
-H 'apikey: YOUR_API_KEY_HERE'
{ "refmap": { "bid": [ … ], "sectrack": [ … ] }, "vulnerable_configuration": [ { … }, { … } ], "vulnerable_configuration_cpe_2_2": [ { … }, { … } ], "vulnerable_product": [ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*" ], "msbulletin": [ { … } ], "modified": "2024-11-21T02:49:49.193000", "published": "2016-11-10T06:59:02.653000", "access": { "authentication": "NONE", "complexity": "MEDIUM", "vector": "NETWORK" }, "assigner": "secure@microsoft.com", "capec": [ { … } ], "cvss": 9.3, "impactScore": 10, "exploitabilityScore": 8.6, "cvssTime": "2024-11-21T02:49:49.193000", "cvssVector": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cwe": "CWE-119", "id": "CVE-2016-3333", "impact": { "availability": "COMPLETE", "confidentiality": "COMPLETE", "integrity": "COMPLETE" }, "impact3": { "availability": "HIGH", "confidentiality": "HIGH", "integrity": "HIGH" }, "exploitability3": { "attackvector": "LOCAL", "attackcomplexity": "LOW", "privilegesrequired": "NONE", "userinteraction": "REQUIRED", "scope": "UNCHANGED" }, "cvss3": 7.8, "impactScore3": 5.9, "exploitabilityScore3": 1.8, "lastModified": "2024-11-21T02:49:49.193000", "references": [ "http://www.securityfocus.com/bid/94009", "http://www.securitytracker.com/id/1037252", "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-134" ], "summary": "The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application" }
curl -i -X GET \
'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-cve-from-cpe-id?cpe=cpe%3A2.3%3Ao%3Agemteks%3Awrtm-127acn_firmware%3A01.01.02.141%3A*%3A*%3A*%3A*%3A*%3A*%3A*&limit=50' \
-H 'apikey: YOUR_API_KEY_HERE'
[ { "refmap": { … }, "vulnerable_configuration": [ … ], "vulnerable_configuration_cpe_2_2": [], "vulnerable_product": [ … ], "modified": "2024-11-21T05:14:40.330000", "published": "2020-09-24T15:15:14.437000", "access": { … }, "assigner": "cve@mitre.org", "cvss": 9, "impactScore": 10, "exploitabilityScore": 8, "cvssTime": "2024-11-21T05:14:40.330000", "cvssVector": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "cwe": "CWE-1188", "id": "CVE-2020-24365", "impact": { … }, "impact3": { … }, "exploitability3": { … }, "cvss3": 8.8, "impactScore3": 5.9, "exploitabilityScore3": 2.8, "lastModified": "2024-11-21T05:14:40.330000", "references": [ … ], "summary": "An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine" } ]
curl -i -X GET \
'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-last?limit=50' \
-H 'apikey: YOUR_API_KEY_HERE'
[ { "vulnerable_configuration_cpe_2_2": [], "modified": "2025-01-23T23:15:08.113000", "published": "2025-01-23T23:15:08.113000", "assigner": "cve@mitre.org", "cwe": "Unknown", "id": "CVE-2024-55573", "impact3": { … }, "exploitability3": { … }, "cvss3": 9.1, "impactScore3": 6, "exploitabilityScore3": 2.3, "lastModified": "2025-01-23T23:15:08.113000", "references": [ … ], "summary": "An issue was discovered in Centreon centreon-web 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, 23.04.x before 23.04.24. A user with high privileges is able to inject SQL into the form used to create virtual metrics" } ]
curl -i -X GET \
'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-product-by-vendor?vendor=microsoft' \
-H 'apikey: YOUR_API_KEY_HERE'
{ "vendor": "microsoft", "product": [ ".net_core", ".net_core_sdk", ".net_framework" ] }
curl -i -X GET \
https://apidocs.rankiteo.com/_mock/openapi/vulnerability-get-vendors \
-H 'apikey: YOUR_API_KEY_HERE'
{ "vendor": [ "01-scripts", "01generator", "01org" ] }
curl -i -X GET \
'https://apidocs.rankiteo.com/_mock/openapi/vulnerability-search-by-vendor?product=excel&vendor=microsoft' \
-H 'apikey: YOUR_API_KEY_HERE'
{ "results": [ { … } ] }