@@ -339,7 +339,7 @@ class VulnerabilityViewSet(viewsets.ReadOnlyModelViewSet):
339339 Lookup for vulnerabilities by id.
340340 """
341341
342- queryset = Vulnerability .objects .all ()
342+ queryset = Vulnerability .objects .all (). order_by ( '-vulnerability_id' )
343343 serializer_class = V2VulnerabilitySerializer
344344 lookup_field = "vulnerability_id"
345345 filter_backends = (filters .DjangoFilterBackend ,)
@@ -377,7 +377,7 @@ class CPEViewSet(viewsets.ReadOnlyModelViewSet):
377377
378378 queryset = Vulnerability .objects .filter (
379379 vulnerabilityreference__reference_id__startswith = "cpe"
380- ).distinct ()
380+ ).distinct (). order_by ( '-vulnerability_id' )
381381 serializer_class = V2VulnerabilitySerializer
382382 filter_backends = (filters .DjangoFilterBackend ,)
383383 throttle_classes = [PermissionBasedUserRateThrottle ]
@@ -397,7 +397,7 @@ def bulk_search(self, request):
397397 for cpe in cpes :
398398 if not cpe .startswith ("cpe" ):
399399 return Response (status = 400 , data = {"Error" : f"Invalid CPE: { cpe } " })
400- qs = Vulnerability .objects .filter (vulnerabilityreference__reference_id__in = cpes ).distinct ()
400+ qs = Vulnerability .objects .filter (vulnerabilityreference__reference_id__in = cpes ).distinct (). order_by ( '-vulnerability_id' )
401401 return Response (V2VulnerabilitySerializer (qs , many = True , context = {"request" : request }).data )
402402
403403
@@ -415,7 +415,7 @@ class AliasViewSet(viewsets.ReadOnlyModelViewSet):
415415 (https://nvd.nist.gov/general/cve-process).
416416 """
417417
418- queryset = Vulnerability .objects .all ()
418+ queryset = Vulnerability .objects .all (). order_by ( '-vulnerability_id' )
419419 serializer_class = V2VulnerabilitySerializer
420420 filter_backends = (filters .DjangoFilterBackend ,)
421421 filterset_class = AliasFilterSet
0 commit comments