Kang Asu
CVE Api - Parse & filter the latest CVEs from cve.mitre.org
Docs
Usage
http://localhost:4000/cve?target=KEYWORDThe year parameter is optional.
http://localhost:4000/cve?target=KEYWORD&year=YEARExamples
http://localhost:4000/cve?target=ruby%20on%20railshttp://localhost:4000/cve?target=ruby%20on%20rails&year=2020If you want to parse the latest year, use the "latest" keyword.
http://localhost:4000/cve?target=ruby%20on%20rails&year=latestGetting started
- Download the project
bundle installruby rest.rb
Requirements
Environment
You can switch between prod & dev at
config/environment.rbYou need to create one yourself, an example can be found here.
Healthcheck
The url will return a status code of 200 which means the api is healthy.
If 200 is not shown then you should assume there is something wrong.
http://localhost:4000/statusManage image
Access
You can access the api via http://localhost:4000/
You should be able to view the index page from the url.
Build image
docker build . -t cve-apiRun image
docker run -p 4000:4000 -d cve-apiGet id
docker psStop image
docker stop IDRemove image
docker rmi cve-apiRegards
Kang Asu




No comments:
Post a Comment
# Silahkan berkomentar, bertanya dan kritik dengan sopan
# Disini anda boleh menyisipkan Link di kolom komentar
# Tetapi akan saya moderasi atau Review terlebih dahulu tiap komentar
# Jangan sampai komentar anda mengandung SPAM.
# Terima Kasih - Regards Muhammad Sobri Maulana