

{"id":1865,"date":"2012-12-28T21:09:38","date_gmt":"2012-12-29T02:09:38","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1865"},"modified":"2018-03-10T07:53:38","modified_gmt":"2018-03-10T12:53:38","slug":"cve-queries-right-from-your-browsers-address-bar","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/","title":{"rendered":"CVE Queries Right From Your Browser&#8217;s Address Bar"},"content":{"rendered":"<p>I&#8217;m not sure why I never did this earlier, but a <a href=\"https:\/\/lifehacker.com\/5971715\/five-custom-searches-you-should-enable-in-your-browser-right-now\">post on LifeHacker<\/a> gave me an idea to add location bar quick search of CVEs (Common Vulnerabilities and Exposures), no doubt due to their example on searching LifeHacker for &#8220;security&#8221;.<\/p>\n<p>My two favorite sites for searching CVE specifics are, at present, <span class=\"removed_link\" title=\"https:\/\/db.risk.io\/\">Risk IO&#8217;s<\/span> and <a href=\"https:\/\/www.cvedetails.com\/\">CVE Details<\/a>.<\/p>\n<p>I&#8217;m fairly certain anyone in security reading this can figure out the rest, but as I&#8217;m ever a slave to minutiae, here are the two shortcuts I&#8217;ve setup in Chrome:<\/p>\n<pre lang=\"text\">\nTitle: CVE Details\nSearch URL: http:\/\/cvedetails.com\/cve-details.php?cve_id=%s\nShortcut: cved\n<\/pre>\n<pre lang=\"text\">\nTitle: Risk I\/O Vulnerability Search\nSearch URL: https:\/\/db.risk.io\/?q=%s\nShortcut: cvedb\n<\/pre>\n<p>Here&#8217;s what the location bar changes to when I use <code>cvedb<\/code> to search for <code>2012&#8209;4774<\/code><\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1866\" data-permalink=\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/screenshot_12_28_12_8_58_pm\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&amp;ssl=1\" data-orig-size=\"272,28\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Screenshot_12_28_12_8_58_PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?resize=272%2C28&#038;ssl=1\" alt=\"Screenshot_12_28_12_8_58_PM\" width=\"272\" height=\"28\" class=\"aligncenter size-full wp-image-1866\" \/><\/center><\/p>\n<p>In reality, this is only saving a scroll and a click since entering <code>CVE&#8209;2012&#8209;4774<\/code> into an unoptimized location bar would have just searched Google and given me most of the usual suspects in the first few links. Still, it saves some time and immediately gets me the vulnerability data from the sites I prefer.<\/p>\n<p>I may start poking to see what other security-related searches I can setup in the location bar.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m not sure why I never did this earlier, but a post on LifeHacker gave me an idea to add location bar quick search of CVEs (Common Vulnerabilities and Exposures), no doubt due to their example on searching LifeHacker for &#8220;security&#8221;. My two favorite sites for searching CVE specifics are, at present, Risk IO&#8217;s and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[68,57,26],"tags":[],"class_list":["post-1865","post","type-post","status-publish","format-standard","hentry","category-browsers","category-chrome","category-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE Queries Right From Your Browser&#039;s Address Bar - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE Queries Right From Your Browser&#039;s Address Bar - rud.is\" \/>\n<meta property=\"og:description\" content=\"I&#8217;m not sure why I never did this earlier, but a post on LifeHacker gave me an idea to add location bar quick search of CVEs (Common Vulnerabilities and Exposures), no doubt due to their example on searching LifeHacker for &#8220;security&#8221;. My two favorite sites for searching CVE specifics are, at present, Risk IO&#8217;s and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-29T02:09:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-10T12:53:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"CVE Queries Right From Your Browser&#8217;s Address Bar\",\"datePublished\":\"2012-12-29T02:09:38+00:00\",\"dateModified\":\"2018-03-10T12:53:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\"},\"wordCount\":185,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png\",\"articleSection\":[\"Browsers\",\"Chrome\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\",\"url\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\",\"name\":\"CVE Queries Right From Your Browser's Address Bar - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png\",\"datePublished\":\"2012-12-29T02:09:38+00:00\",\"dateModified\":\"2018-03-10T12:53:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&ssl=1\",\"width\":272,\"height\":28},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE Queries Right From Your Browser&#8217;s Address Bar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE Queries Right From Your Browser's Address Bar - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/","og_locale":"en_US","og_type":"article","og_title":"CVE Queries Right From Your Browser's Address Bar - rud.is","og_description":"I&#8217;m not sure why I never did this earlier, but a post on LifeHacker gave me an idea to add location bar quick search of CVEs (Common Vulnerabilities and Exposures), no doubt due to their example on searching LifeHacker for &#8220;security&#8221;. My two favorite sites for searching CVE specifics are, at present, Risk IO&#8217;s and [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/","og_site_name":"rud.is","article_published_time":"2012-12-29T02:09:38+00:00","article_modified_time":"2018-03-10T12:53:38+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"CVE Queries Right From Your Browser&#8217;s Address Bar","datePublished":"2012-12-29T02:09:38+00:00","dateModified":"2018-03-10T12:53:38+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/"},"wordCount":185,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png","articleSection":["Browsers","Chrome","Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/","url":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/","name":"CVE Queries Right From Your Browser's Address Bar - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png","datePublished":"2012-12-29T02:09:38+00:00","dateModified":"2018-03-10T12:53:38+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/12\/Screenshot_12_28_12_8_58_PM.png?fit=272%2C28&ssl=1","width":272,"height":28},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/12\/28\/cve-queries-right-from-your-browsers-address-bar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"CVE Queries Right From Your Browser&#8217;s Address Bar"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-u5","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":23595,"url":"https:\/\/rud.is\/b\/2024\/12\/04\/cvesky-monitoring-the-bluesky-jetstream-for-cve-mentions\/","url_meta":{"origin":1865,"position":0},"title":"CVESky: Monitoring The Bluesky Jetstream For CVE Mentions","author":"hrbrmstr","date":"2024-12-04","format":false,"excerpt":"I mentioned this new app over at the newsletter but it deserves a mention on the legacy blog. CVESky is a tool to explore CVE chatter on Bluesky. At work, we're ingesting the Bluesky Jetstream and watching for CVE chatter, excluding daft bots that just regurgitate new NVD CVEs. There\u2026","rel":"","context":"In &quot;bluesky&quot;","block_context":{"text":"bluesky","link":"https:\/\/rud.is\/b\/category\/bluesky\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2024\/12\/og-image.png?fit=1200%2C631&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2024\/12\/og-image.png?fit=1200%2C631&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2024\/12\/og-image.png?fit=1200%2C631&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2024\/12\/og-image.png?fit=1200%2C631&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2024\/12\/og-image.png?fit=1200%2C631&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":18584,"url":"https:\/\/rud.is\/b\/2024\/03\/23\/vulnchecks-free-community-kev-cve-apis-code-golang-cli-utility\/","url_meta":{"origin":1865,"position":1},"title":"VulnCheck&#8217;s Free Community KEV &#038; CVE APIs  (Code &#038; Golang CLI Utility)","author":"hrbrmstr","date":"2024-03-23","format":false,"excerpt":"VulnCheck has some new, free API endpoints for the cybersecurity community. Two extremely useful ones are for their extended version of CISA\u2019s KEV, and an in-situ replacement for NVD\u2019s sad excuse for an API and soon-to-be-removed JSON feeds. There are two ways to work with these APIs. One is retrieve\u2026","rel":"","context":"In &quot;APIs&quot;","block_context":{"text":"APIs","link":"https:\/\/rud.is\/b\/category\/apis\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":19774,"url":"https:\/\/rud.is\/b\/2024\/05\/03\/cve-2024-27322-should-never-have-been-assigned-and-r-data-files-are-still-super-risky-even-in-r-4-4-0\/","url_meta":{"origin":1865,"position":2},"title":"CVE-2024-27322 Should Never Have Been Assigned And R Data Files Are Still Super Risky Even In R 4.4.0","author":"hrbrmstr","date":"2024-05-03","format":false,"excerpt":"I had not planned to blog this (this is an incredibly time-crunched week for me) but CERT\/CC and CISA made a big deal out of a non-vulnerability in R, and it's making the round on socmed, so here we are. A security vendor decided to try to get some hype\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11648,"url":"https:\/\/rud.is\/b\/2018\/11\/14\/use-github-vulnerability-alerts-to-keep-users-of-your-r-packages-safe\/","url_meta":{"origin":1865,"position":3},"title":"Use GitHub Vulnerability Alerts to Keep Users of Your R Packages Safe","author":"hrbrmstr","date":"2018-11-14","format":false,"excerpt":"Despite their now inherent evil status, GitHub has some tools other repository aggregators do not. One such tool is the free vulnerability alert service which will scan repositories for outdated+vulnerable dependencies. Now, \"R\" is nowhere near a first-class citizen in the internet writ large, including software development tooling (e.g. the\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1532,"url":"https:\/\/rud.is\/b\/2012\/07\/20\/veris-community-json-vs-xml\/","url_meta":{"origin":1865,"position":4},"title":"VERIS Community :: JSON vs XML","author":"hrbrmstr","date":"2012-07-20","format":false,"excerpt":"You may not be aware of the fact that the #spiffy Verizon Biz folk have some VERIS open source components, one of which is the XML schema for the \"Vocabulary for Event Recording and Incident Sharing\". While most Java-backends will readily slurp up and spit back archaic XML data, the\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11825,"url":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/","url_meta":{"origin":1865,"position":5},"title":"Acquisitions and Supply Chains: The Achilles&#8217; heel of Product\/Organizational Security","author":"hrbrmstr","date":"2019-01-29","format":false,"excerpt":"(A reminder to folks expecting \"R\"\/\"data science\" content: the feed for that is at https:\/\/rud.is\/b\/category\/r\/feed\/ if you don't want to see the occasional non-R\/datasci posts.) Over at the $WORK blog we posted some research into the fairly horrible Cisco RV320\/RV325 router vulnerability. The work blog is the work blog and\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1865"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1865\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}