From 83c9c67ef33cc43e809be66fc28f50f7ee013ba2 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 20 Sep 2021 17:07:11 +0200 Subject: [PATCH] new: [doc] public online version added --- README.md | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/README.md b/README.md index 08ce53e..76f3cb2 100644 --- a/README.md +++ b/README.md @@ -13,6 +13,30 @@ be used against [cve-search](https://github.com/cve-search/cve-search) to do act To use CPE guesser, you have to initialise the Redis database with `import.py`. Then you can use the software with `lookup.py` to find the most probable CPE matching the keywords provided. +### Public online version + +[cpe-guesser.cve-search.org](https://cpe-guesser.cve-search.org) is public online version of CPE guesser which can be used via +a simple API. The endpoint is `/search` and the JSON is composed of a query list with the list of keyword(s) to search for. + + +~~~~ +curl -s -X POST https://cpe-guesser.cve-search.org/search -d "{\"query\": [\"outlook\", \"connector\"]}" | jq . +[ + [ + 18117, + "cpe:2.3:a:microsoft:outlook_connector" + ], + [ + 60947, + "cpe:2.3:a:oracle:oracle_communications_unified_communications_suite_connector_for_microsoft_outlook" + ], + [ + 68306, + "cpe:2.3:a:oracle:corporate_time_outlook_connector" + ] +] +~~~~ + ### Command line - `lookup.py` ~~~~