With this update, if you have a predetermined server, time period, and filter, you can specify the various parameters in the URL when you open VulsRepo, saving you the trouble of manually selecting them each time.
Previously, you had to open VulsRepo, manually select the date and server, press the Submit button, and then select the filter if necessary.
Features
- #189 It is now possible to select the data to be displayed by specifying several parameters.
The following parameters can be specified.
| Parameter | Purpose | Value |
|---|---|---|
| server | Target server (container) | For all, all. If more than one, concatenate them with +. ex)foo.json, foo.json+bar.json+baz@foo.json |
| daterange | Date Range | today, yesterday, last7days, last30days, thismonth, lastmonth or alldays |
| datefrom | Date Range from (*) | YYYY-MM-DD format ex)2020-11-01 |
| dateto | Date Range to (*) | YYYY-MM-DD format ex)2021-01-23 |
| time | Specific date and time | ISO8601 format ex) 2020-02-04T01:25:11Z or 2021-01-25T12:34:56+09:00 |
| filter | Specifying a filter | Filter name. If not specified, no filter ex) 01.%20Graph:%20CVSS-Severity%20=>%20ServerName |
(*) datefrom and dateto must be specified as a set.
Priority of date-related parameters
High daterange > datefrom and dateto > time Low
If none of these are specified, the latest date will be set.
Examples
Here are some examples.
localhost.json of the latest date
https://monocosel.jp/vulsrepo/?server=localhost.json
localhost.json and raspberry10.json for the last 30 days
https://monocosel.jp/vulsrepo/?daterange=last30days&server=localhost.json+raspberry10.json
All servers (containers) from 2020-09-18 to 2020-11-16
https://monocosel.jp/vulsrepo/?datefrom=2020-09-18&dateto=2020-11-16&server=all
localhost.json on 2020-02-04T01:25:11Z
https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json
localhost.json and vulsrepo@localhost.json on 2020-02-04T01:25:11Z
localhost.json on 2020-02-04T01:25:11Z with 01. Graph: CVSS-Severity => ServerName filter
localhost.json on 2020-02-04T01:25:11Z with 02. Graph: CVSS-Severity => CVSS-Score filter
localhost.json on 2020-02-04T01:25:11Z with 03. Pivot: Package/CVSS-Severity/CveID/Summary => ServerName filter
localhost.json on 2020-02-04T01:25:11Z with 04. Pivot: Package/CveID => ScanTime filter
localhost.json on 2020-02-04T01:25:11Z with 05. Pivot: CveID/PackageInfo => NotFixedYet filter
Changes
- Nothing.
Fixes
- #189 Removed debug log.
Docker image
ishidaco/vulsrepo - Docker Hub
docker pull ishidaco/vulsrepo
docker pull ishidaco/vulsrepo:version-0.4.0
Demo
VulsRepo online demo is here.
You can see a sample of the following vulnerability scan results.
- Amazon Linux 2
- Ubuntu 18.04
- Raspbian 9.13
- Raspberry Pi OS 10
- Oracle Linux 7.9
- CentOS 8.2
- Debian 10
- Alpine Linux on Docker container
- Ubuntu 14.04 on Docker container
See also https://github.com/ishiDACo/vulsrepo/releases/tag/v0.4.0
