Eclipse Foundation Info API (1.0.0)

Download OpenAPI specification:Download

Access information on the Eclipse Foundation, such as trademarks, councils, and board members.

Trademarks

Eclipse Foundation Trademarks

Trademarks List

Fetches all public Trademarks data.

query Parameters
type
string
Enum: "R" "T"

The type of trademark to include

Responses

Response samples

Content type
application/json
[
  • {
    }
]

Trademarks List by category

Fetches all public Trademarks data for the given category.

path Parameters
category
required
string

The category grouping to filter trademarks to

query Parameters
type
string
Enum: "R" "T"

The type of trademark to include

Responses

Response samples

Content type
application/json
[
  • {
    }
]

Board Members

Eclipse Foundation board members

Board of Directors list

Returns a list of members on the board of directors

Responses

Response samples

Content type
application/json
[
  • {
    }
]

CVE

CVE List

Fetches all public CVE data.

Responses

Response samples

Content type
application/json
[]

CVE

Returns a CVE entry that has a matching id

path Parameters
id
required
string

The id of the CVE to retrieve

Responses

Response samples

Content type
application/json
{}

CVE RSS feed

Returns an RSS feed for the known and public vulnerabilities

Responses

Response samples

Content type
application/xml
<rdf:RDF
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns="http://purl.org/rss/1.0/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://eclipse.org/security/known/rss.xml">
        <title>Eclipse Foundation Project CVE database</title>
        <link>https://eclipse.org/security/known/rss.xml</link>
        <description>Disclosed CVE records pertaining to Eclipse Foundation projects.</description>
        <items>
            <rdf:Seq>
                <rdf:li />
                <rdf:li />
                <rdf:li />
            </rdf:Seq>
        </items>
        <dc:creator>Eclipse Foundation WebDev</dc:creator>
        <dc:date>2024-03-28T19:45:02Z</dc:date>
        <dc:language>en-gb</dc:language>
    </channel>
    <item rdf:about="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7649">
        <title>CVE-2017-7649</title>
        <link>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7649</link>
        <description>The network enabled distribution of Kura before 2.1.0 takes control over the device's firewall setup but does not allow IPv6 firewall rules to be configured. Still the Equinox console port 5002 is left open, allowing to log into Kura without any user credentials over unencrypted telnet and executing commands using the Equinox "exec" command. As the process is running as "root" full control over the device can be acquired. IPv6 is also left in auto-configuration mode, accepting router advertisements automatically and assigns a MAC address based IPv6 address.</description>
        <dc:date>2017-04-14T04:00:00Z</dc:date>
    </item>
    <item rdf:about="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7650">
        <title>CVE-2017-7650</title>
        <link>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7650</link>
        <description>In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.</description>
        <dc:date>2017-05-17T04:00:00Z</dc:date>
    </item>
    <item rdf:about="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7651">
        <title>CVE-2017-7651</title>
        <link>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7651</link>
        <description>In Eclipse Mosquitto 1.4.14, a user can shutdown the Mosquitto server simply by filling the RAM memory with a lot of connections with large payload. This can be done without authentications if occur in connection phase of MQTT protocol.</description>
        <dc:date>2018-02-27T05:00:00Z</dc:date>
    </item>
</rdf:RDF>