File: control

package info (click to toggle)
sploitscan 0.10.5-1
  • links: PTS, VCS
  • area: main
  • in suites: sid, trixie
  • size: 244 kB
  • sloc: python: 901; makefile: 6
file content (49 lines) | stat: -rw-r--r-- 2,266 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
Source: sploitscan
Section: misc
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com>
Rules-Requires-Root: no
Build-Depends: debhelper-compat (= 13),
               dh-sequence-python3,
               pybuild-plugin-pyproject,
               python3-all,
               python3-jinja2,
               python3-openai,
               python3-poetry,
               python3-requests,
               python3-setuptools
Standards-Version: 4.7.0
Homepage: https://github.com/xaitax/SploitScan
Vcs-Browser: https://salsa.debian.org/pkg-security-team/sploitscan
Vcs-Git: https://salsa.debian.org/pkg-security-team/sploitscan.git

Package: sploitscan
Architecture: all
Depends: python3-tabulate,
         ${misc:Depends},
         ${python3:Depends}
Suggests: python3-pygments
Description: Search for CVE information
 SploitScan is an efficient and easy-to-use command-line tool designed to
 consult CVE (Common Vulnerabilities and Exposures).
 Extremely important for professionals, as it allows them to implement
 measures that prevent the exploitation of discovered vulnerabilities.
 .
 Tool is capable of exporting in a single run results for JSON and CSV
 formats, from the main databases of entities and organizations linked
 to cybersecurity:
    - MITER Corporation. non-profit organization that provides technical
      solutions to critical security issue
    - EPSS (Exploit Prediction Scoring System) is a system that aims to
      predict the probability of a specific vulnerability, helping organizations
      prioritize their mitigation activities.
    - Gather PoCs (Proof of Concepts) Collecting PoCs is a common activity
      among vulnerability researchers and security professionals, who reproduce
      the severity of vulnerabilities in a controlled environment, aiming to
      take preventive measures.
    - CISA Infrastructure Security Agency - responsible for keeping Known
      Exploited Vulnerabilities Catalog (KEV) updated.
    - Capable of interacting with the Patch Priority System, responsible for
      evaluating and assigning a patch priority rating based on several factors,
      including the availability of public exploits.