モノコセル

モノコセル

「こせる」とは千葉の方言で「作る」の意味。
今を越せる残せるモノをこせる。

2 minutes read

With this update, if you have a predetermined server, time period, and filter, you can specify the various parameters in the URL when you open VulsRepo, saving you the trouble of manually selecting them each time.

Previously, you had to open VulsRepo, manually select the date and server, press the Submit button, and then select the filter if necessary.

Features

  • #189 It is now possible to select the data to be displayed by specifying several parameters.

The following parameters can be specified.

Parameter Purpose Value
server Target server (container) For all, all. If more than one, concatenate them with +. ex)foo.json, foo.json+bar.json+baz@foo.json
daterange Date Range today, yesterday, last7days, last30days, thismonth, lastmonth or alldays
datefrom Date Range from (*) YYYY-MM-DD format ex)2020-11-01
dateto Date Range to (*) YYYY-MM-DD format ex)2021-01-23
time Specific date and time ISO8601 format ex) 2020-02-04T01:25:11Z or 2021-01-25T12:34:56+09:00
filter Specifying a filter Filter name. If not specified, no filter ex) 01.%20Graph:%20CVSS-Severity%20=>%20ServerName

(*) datefrom and dateto must be specified as a set.

High daterange > datefrom and dateto > time Low

If none of these are specified, the latest date will be set.

Examples

Here are some examples.

localhost.json of the latest date

https://monocosel.jp/vulsrepo/?server=localhost.json

localhost.json and raspberry10.json for the last 30 days

https://monocosel.jp/vulsrepo/?daterange=last30days&server=localhost.json+raspberry10.json

All servers (containers) from 2020-09-18 to 2020-11-16

https://monocosel.jp/vulsrepo/?datefrom=2020-09-18&dateto=2020-11-16&server=all

localhost.json on 2020-02-04T01:25:11Z

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json

localhost.json and vulsrepo@localhost.json on 2020-02-04T01:25:11Z

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json+vulsrepo@localhost.json

localhost.json on 2020-02-04T01:25:11Z with 01. Graph: CVSS-Severity => ServerName filter

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json&filter=01.%20Graph:%20CVSS-Severity%20=%3E%20ServerName

localhost.json on 2020-02-04T01:25:11Z with 02. Graph: CVSS-Severity => CVSS-Score filter

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json&filter=02.%20Graph:%20CVSS-Severity%20=%3E%20CVSS-Score

localhost.json on 2020-02-04T01:25:11Z with 03. Pivot: Package/CVSS-Severity/CveID/Summary => ServerName filter

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json&filter=03.%20Pivot:%20Package/CVSS-Severity/CveID/Summary%20=%3E%20ServerName

localhost.json on 2020-02-04T01:25:11Z with 04. Pivot: Package/CveID => ScanTime filter

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json&filter=04.%20Pivot:%20Package/CveID%20=%3E%20ScanTime

localhost.json on 2020-02-04T01:25:11Z with 05. Pivot: CveID/PackageInfo => NotFixedYet filter

https://monocosel.jp/vulsrepo/?time=2020-02-04T01:25:11Z&server=localhost.json&filter=05.%20Pivot:%20CveID/PackageInfo%20=%3E%20NotFixedYet

Changes

  • Nothing.

Fixes

  • #189 Removed debug log.

Docker image

ishidaco/vulsrepo - Docker Hub

docker pull ishidaco/vulsrepo
docker pull ishidaco/vulsrepo:version-0.4.0

Demo

VulsRepo online demo is here.

You can see a sample of the following vulnerability scan results.

  • Amazon Linux 2
  • Ubuntu 18.04
  • Raspbian 9.13
  • Raspberry Pi OS 10
  • Oracle Linux 7.9
  • CentOS 8.2
  • Debian 10
  • Alpine Linux on Docker container
  • Ubuntu 14.04 on Docker container

See also https://github.com/ishiDACo/vulsrepo/releases/tag/v0.4.0

Recent posts

See more

Categories

Tags

About

フリーランスのシステムエンジニア。受託開発ソフトウェア業の中小企業での 18 年間の勤務を経て、2019 年よりフリーランス。新技術を習得するのが得意。千葉県在住。