-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
test post with feeds. list of posts seens broken
- Loading branch information
1 parent
44c075e
commit 3353f12
Showing
10 changed files
with
188 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -5,7 +5,6 @@ public.tar.gz | |
.hugo_build.lock | ||
|
||
resources/_gen/ | ||
themes/ | ||
|
||
## OS Files | ||
# Windows | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
[submodule "themes/hextra"] | ||
path = themes/hextra | ||
url = https://github.com/imfing/hextra.git |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,73 @@ | ||
--- | ||
title: "Vulnerability-Lookup 2.2.0 released" | ||
slug: vulnerability-lookup-2-2-0 | ||
author: Cédric Bonhomme | ||
date: 2024-11-28 | ||
tags: | ||
- Vulnerability-Lookup | ||
- release | ||
excludeSearch: true | ||
--- | ||
|
||
|
||
We’re delighted to announce the release of Vulnerability-Lookup 2.2.0, | ||
packed with enhancements, new features, and bug fixes. | ||
|
||
|
||
### What's New | ||
|
||
- **Identity**: | ||
- Vulnerability-Lookup now has a beautiful new logo. | ||
|
||
- **New Statistics Namespace**: | ||
The API now offers a dedicated namespace for statistics. Two new endpoints are currently available: | ||
- `/api/stats/vulnerability/most_sighted` | ||
- `/api/stats/vulnerability/most_commented` | ||
Both endpoints provide the option to return results in a Markdown table format. | ||
([7a2b8ed](https://github.com/cve-search/vulnerability-lookup/commit/7a2b8edf717d492452efb100158678606c7ac9de), | ||
[d95b49c](https://github.com/cve-search/vulnerability-lookup/commit/d95b49c6c421cf34a2817afb3a7c1ef690752e50)) | ||
|
||
You can use the API output directly to generate PDF reports: | ||
```bash | ||
$ curl -s -X 'GET' 'https://vulnerability.circl.lu/api/stats/vulnerability/most_sighted?date_from=2024-07-01&output=markdown' | pandoc --from=markdown --to=pdf -o semestrial-report.pdf | ||
``` | ||
![semestrial-report](https://github.com/user-attachments/assets/e4338748-df18-449b-8ac4-ebf42389add0) | ||
|
||
- **New Client for KEV Sightings**: | ||
A new Python client, [KevSight](https://pypi.org/project/kevsight/), is available to generate sightings for Vulnerability-Lookup using the [Known Exploited Vulnerabilities (KEV) catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog). | ||
For more details, refer to the [Vulnerability-Lookup documentation](https://vulnerability.circl.lu/documentation/sightings.html#automation) on sightings automation and the available clients. | ||
|
||
|
||
### Changes | ||
|
||
- **API Enhancements**: | ||
- Numerous improvements and harmonization across the API while maintaining | ||
compatibility with previous versions. | ||
[PyVulVulnerabilityLookup](https://github.com/cve-search/PyVulnerabilityLookup) has been updated. ([f9a03fb](https://github.com/cve-search/vulnerability-lookup/commit/f9a03fba029935bfe255f637a9fc6ac5a3ba91f9), [79cc46d](https://github.com/cve-search/vulnerability-lookup/commit/79cc46d295b33e677ea1327af289a97e800b9c06)) | ||
|
||
- **Improved Views**: | ||
- `/recent`: Enhanced for greater consistency and readability. | ||
- `/vuln`: Improved display for vulnerabilities from the CVE List v5 and NVD sources. | ||
The versions of the impacted products is now displayed in a third column. ([9308772](https://github.com/cve-search/vulnerability-lookup/commit/9308772e3156d2535b31f38ea78831d2b2cca3e3), [5f9826a](https://github.com/cve-search/vulnerability-lookup/commit/5f9826ae4e248fc9e3e9b8e3d7a16050793670e6), [f71da45](https://github.com/cve-search/vulnerability-lookup/commit/f71da4578461726e3a08d31c7d48cf54e623db93), [54ad96e](https://github.com/cve-search/vulnerability-lookup/commit/54ad96ee18a54247af8e71d7dae8c9b565080869), [e8ae16e](https://github.com/cve-search/vulnerability-lookup/commit/e8ae16e8a2829e1172a60e6cdad04e5e6d711cb4)) | ||
- We have enhanced the layout and accessibility of various views as part of our ongoing | ||
commitment to creating software that is inclusive and usable for everyone. | ||
|
||
- **Documentation**: | ||
- The documentation is now exposed by a dedicated Flask Blueprint which is serving static HTML | ||
files generated with Sphinx. Updating the documentation is possible via a simple button in the dashboard of Vulnerability-Lookup. ([e27ac9f](https://github.com/cve-search/vulnerability-lookup/commit/e27ac9f353384f5d61d2635be584cd8560319b95), [6f38ccf](https://github.com/cve-search/vulnerability-lookup/commit/6f38ccf36a48ec6d67b118b8f9370549150b34a4)) | ||
|
||
- **Backend**: | ||
- Harmonization of datetime objects by ensuring that all dates use UTC-aware timestamps ([8ea2554](https://github.com/cve-search/vulnerability-lookup/commit/8ea25544f334a3be7bdf9483cab317b64d99a8d7), | ||
[a4defc2](https://github.com/cve-search/vulnerability-lookup/commit/a4defc272c77e4c9ab118fc5ed02be46110c1185)) | ||
- Gunicorn is now by default using Gevent ([c79f997](https://github.com/cve-search/vulnerability-lookup/commit/c79f9977702346d6f59962b66367569e4f33d580)) | ||
|
||
|
||
### Fixes | ||
|
||
- **Date Parameters in API**: | ||
- The `date_from` and `date_to` parameters in the API no longer have default values. | ||
It is now the client’s responsibility to specify these values. ([036ca3a](https://github.com/cve-search/vulnerability-lookup/commit/036ca3a358eef5f740c363480fb082984741d80b)) | ||
|
||
|
||
- **CVE Lookup Endpoint**: | ||
- We fixed the API endpoint for searching CVEs by vendor and product. ([0867fac](https://github.com/cve-search/vulnerability-lookup/commit/0867fac80f772878278c90790db9b9644beba88b)) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
--- | ||
title: "News" | ||
--- | ||
|
||
<div style="text-align: center; margin-top: 1em;"> | ||
{{< hextra/hero-badge link="index.xml" >}} | ||
<span>RSS Feed</span> | ||
{{< icon name="rss" attributes="height=14" >}} | ||
{{< /hextra/hero-badge >}} | ||
</div> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.