sploitscan 0.9.1-3 source package in Ubuntu
Changelog
sploitscan (0.9.1-3) unstable; urgency=medium * debian/control: - Bumped to version 4.7.0 - Fixed Vcs urls (Closes: #1072882) * debian/rules: Files fixed after compilation (Closes: #1072747) * debian/sploitscan.links: Created symbolic links to usr/lib * debian/sploitscan.install: Files moved to usr/share (Closes: #1072816) -- Josenilson Ferreira da Silva <email address hidden> Mon, 24 Jun 2024 10:39:14 -0300
Upload details
- Uploaded by:
- Debian Security Tools
- Uploaded to:
- Sid
- Original maintainer:
- Debian Security Tools
- Architectures:
- all
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | misc |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
sploitscan_0.9.1-3.dsc | 2.1 KiB | 6bd04eca575742ce2f98c1579c18d0b9d91699cfdca8353dbf45e32e96400c68 |
sploitscan_0.9.1.orig.tar.gz | 28.3 KiB | b54cfc2daf85d9a28e0311a9f0c9275428b98305218a9e2975773fb86629c691 |
sploitscan_0.9.1-3.debian.tar.xz | 3.1 KiB | 315740ae133a77b8fec764291d3029ad04dfe31505baf75ec3fa65368d808579 |
Available diffs
- diff from 0.9.1-2 to 0.9.1-3 (1.1 KiB)
No changes file available.
Binary packages built by this source
- sploitscan: Search for CVE information
SploitScan is an efficient and easy-to-use command-line tool designed to
consult CVE (Common Vulnerabilities and Exposures).
Extremely important for professionals, as it allows them to implement
measures that prevent the exploitation of discovered vulnerabilities.
.
Tool is capable of exporting in a single run results for JSON and CSV
formats, from the main databases of entities and organizations linked
to cybersecurity:
- MITER Corporation. non-profit organization that provides technical
solutions to critical security issue
- EPSS (Exploit Prediction Scoring System) is a system that aims to
predict the probability of a specific vulnerability, helping organizations
prioritize their mitigation activities.
- Gather PoCs (Proof of Concepts) Collecting PoCs is a common activity
among vulnerability researchers and security professionals, who reproduce
the severity of vulnerabilities in a controlled environment, aiming to
take preventive measures.
- CISA Infrastructure Security Agency - responsible for keeping Known
Exploited Vulnerabilities Catalog (KEV) updated.
- Capable of interacting with the Patch Priority System, responsible for
evaluating and assigning a patch priority rating based on several factors,
including the availability of public exploits.