Feed syndication#
Available feeds#
Endpoint |
Methods |
Rule |
---|---|---|
bundles_bp.feed_bundles |
GET |
/bundles/feed.<string:format>[?user=<login>] |
comments_bp.feed_comments |
GET |
/comments/feed.<string:format>[?user=<login>] |
user_bp.feed_activity |
GET |
/user/<string:login>.<string:format> |
home_bp.feed_recent |
GET |
/recent/<string:source>.<string:format>[?vulnerability=<vuln-id>] |
The value of format
can be rss
or atom
.
The value of source
can be one of the following:
“all”,
“github”,
“cvelistv5”,
“nvd”,
“pysec”,
“gsd”,
“ossf_malicious_packages”,
“csaf_certbund”,
“csaf_siemens”,
“csaf_redhat”,
“csaf_cisa”,
“csaf_cisco”,
“csaf_sick”,
“csaf_nozominetworks”,
“csaf_ox”,
“variot”.
Examples#
Recent vulnerabilities from all sources#
$ curl https://vulnerability.circl.lu/recent/all.atom
Recent vulnerabilities from pysec#
$ curl https://vulnerability.circl.lu/recent/pysec.atom
Recent vulnerabilities related to a vendor#
$ curl 'https://vulnerability.circl.lu/recent/cvelistv5.atom?vendor=MISP&per_page=2&page=8'
<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
<id>https://vulnerability.circl.lu/rss/recent/cvelistv5/2</id>
<title>Most recent entries from cvelistv5</title>
<updated>2024-11-26T08:02:41.668408+00:00</updated>
<author>
<name>Vulnerability Lookup</name>
<email>info@circl.lu</email>
</author>
<link href="https://vulnerability.circl.lu" rel="alternate"/>
<generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
<subtitle>Contains only the most 2 recent entries.</subtitle>
<entry>
<id>https://vulnerability.circl.lu/vuln/cve-2021-37534</id>
<title>cve-2021-37534</title>
<updated>2024-11-26T08:02:41.670402+00:00</updated>
<link href="https://vulnerability.circl.lu/vuln/cve-2021-37534"/>
</entry>
<entry>
<id>https://vulnerability.circl.lu/vuln/cve-2022-29528</id>
<title>cve-2022-29528</title>
<updated>2024-11-26T08:02:41.670364+00:00</updated>
<link href="https://vulnerability.circl.lu/vuln/cve-2022-29528"/>
</entry>
</feed>
Recent vulnerabilities linked to the specified vulnerability#
$ curl 'https://vulnerability.circl.lu/recent/all.atom?vulnerability=cve-2021-22280'
<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
<id>https://vulnerability.circl.lu/rss/recent/all/10</id>
<title>Most recent entries from all</title>
<updated>2024-11-26T08:03:09.000211+00:00</updated>
<author>
<name>Vulnerability Lookup</name>
<email>info@circl.lu</email>
</author>
<link href="https://vulnerability.circl.lu" rel="alternate"/>
<generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
<subtitle>Contains only the most 10 recent entries.</subtitle>
<entry>
<id>https://vulnerability.circl.lu/vuln/ghsa-x53h-2cjp-mwcx</id>
<title>ghsa-x53h-2cjp-mwcx</title>
<updated>2024-11-26T08:03:09.013675+00:00</updated>
<link href="https://vulnerability.circl.lu/vuln/ghsa-x53h-2cjp-mwcx"/>
</entry>
<entry>
<id>https://vulnerability.circl.lu/vuln/gsd-2021-22280</id>
<title>gsd-2021-22280</title>
<updated>2024-11-26T08:03:09.013602+00:00</updated>
<link href="https://vulnerability.circl.lu/vuln/gsd-2021-22280"/>
</entry>
</feed>
Subscribing to the activity related to a vulnerability#
The request will return recent observations (sightings) related to a vuln.