sploitscan 0.9.1-3 source package in Ubuntu

Changelog

sploitscan (0.9.1-3) unstable; urgency=medium

  * debian/control:
    - Bumped to version 4.7.0
    - Fixed Vcs urls (Closes: #1072882)
  * debian/rules: Files fixed after compilation (Closes: #1072747)
  * debian/sploitscan.links: Created symbolic links to usr/lib
  * debian/sploitscan.install: Files moved to usr/share (Closes: #1072816)

 -- Josenilson Ferreira da Silva <email address hidden>  Mon, 24 Jun 2024 10:39:14 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
all
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe misc

Builds

Oracular: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
sploitscan_0.9.1-3.dsc 2.1 KiB 6bd04eca575742ce2f98c1579c18d0b9d91699cfdca8353dbf45e32e96400c68
sploitscan_0.9.1.orig.tar.gz 28.3 KiB b54cfc2daf85d9a28e0311a9f0c9275428b98305218a9e2975773fb86629c691
sploitscan_0.9.1-3.debian.tar.xz 3.1 KiB 315740ae133a77b8fec764291d3029ad04dfe31505baf75ec3fa65368d808579

Available diffs

No changes file available.

Binary packages built by this source

sploitscan: Search for CVE information

 SploitScan is an efficient and easy-to-use command-line tool designed to
 consult CVE (Common Vulnerabilities and Exposures).
 Extremely important for professionals, as it allows them to implement
 measures that prevent the exploitation of discovered vulnerabilities.
 .
 Tool is capable of exporting in a single run results for JSON and CSV
 formats, from the main databases of entities and organizations linked
 to cybersecurity:
    - MITER Corporation. non-profit organization that provides technical
      solutions to critical security issue
    - EPSS (Exploit Prediction Scoring System) is a system that aims to
      predict the probability of a specific vulnerability, helping organizations
      prioritize their mitigation activities.
    - Gather PoCs (Proof of Concepts) Collecting PoCs is a common activity
      among vulnerability researchers and security professionals, who reproduce
      the severity of vulnerabilities in a controlled environment, aiming to
      take preventive measures.
    - CISA Infrastructure Security Agency - responsible for keeping Known
      Exploited Vulnerabilities Catalog (KEV) updated.
    - Capable of interacting with the Patch Priority System, responsible for
      evaluating and assigning a patch priority rating based on several factors,
      including the availability of public exploits.