[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1063687: marked as done (ITP: sploitscan -- Search for CVE information)



Your message dated Fri, 19 Apr 2024 18:10:13 +0000
with message-id <E1rxsgf-007e9l-6A@fasolo.debian.org>
and subject line Bug#1063687: fixed in sploitscan 0.2.0+git20240219.cf6360e-1
has caused the Debian Bug report #1063687,
regarding ITP: sploitscan -- Search for CVE information
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1063687: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063687
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com>
X-Debbugs-Cc: debian-devel@lists.debian.org, nilsonfsilva@hotmail.com

* Package name    : sploitscan
  Version         : 0.0.0
  Upstream Contact: Alex xaitax <ah@primepage.de>
* URL             : https://github.com/xaitax/SploitScan
* License         : GPL-3.0 
  Programming Lang: Python
  Description     : Search for CVE information

  sploitScan is an efficient and easy-to-use command-line tool designed to
  query CVEs. Extremely important, as it allows professionals to implement
  measures that prevent the exploitation of discovered vulnerabilities.
  .
  Through ".csv and .json" files, the tool obtains information from the
  main entities that deal with CVE's, this allows you to:
    - Extract CVE details from the national vulnerability database.
    - Integration with EPSS (Exploit Prediction Scoring System), providing
      a probability score for the probability of CVE exploitation, assisting
      with prioritization.
    - Gather PoCs (Proof of Concepts) publicly available exploits, improving
      understanding of vulnerabilities.
    - Show through KEV whether CVE has been listed in the Cybersecurity and
      Infrastructure Security Agency's (CISA) Exploited Vulnerabilities.
    - Capable of interacting with the Patch Priority System, responsible for
      evaluating and assigning a patch priority rating based on several factors,
      including the availability of public exploits.
    - Multi-CVE support and export options: Supports multiple CVEs in a single
      run and allows you to export the results to JSON and CSV formats

--- End Message ---
--- Begin Message ---
Source: sploitscan
Source-Version: 0.2.0+git20240219.cf6360e-1
Done: Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com>

We believe that the bug you reported is fixed in the latest version of
sploitscan, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1063687@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com> (supplier of updated sploitscan package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 20 Feb 2024 19:43:02 -0300
Source: sploitscan
Binary: sploitscan
Architecture: source all
Version: 0.2.0+git20240219.cf6360e-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Changed-By: Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com>
Description:
 sploitscan - Search for CVE information
Closes: 1063687
Changes:
 sploitscan (0.2.0+git20240219.cf6360e-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1063687)
Checksums-Sha1:
 37f7b95f852a1e067bb8f7aace0476c2c226c265 2237 sploitscan_0.2.0+git20240219.cf6360e-1.dsc
 ac38d965ca51cc09cad1f103be7b570dce8879fe 16480 sploitscan_0.2.0+git20240219.cf6360e.orig.tar.xz
 484bbb83e973578c49d969472a770814f6983fe9 3464 sploitscan_0.2.0+git20240219.cf6360e-1.debian.tar.xz
 f3267130df3d4310077a2da4c3dbd38f20070b5f 10128 sploitscan_0.2.0+git20240219.cf6360e-1_all.deb
 c0f89d315980a92b52053b51ce4ac6c0c814dbec 9058 sploitscan_0.2.0+git20240219.cf6360e-1_amd64.buildinfo
Checksums-Sha256:
 ed8981d6e735c00c56b873f20a725d7e17136eeee6c37a0bd98090e46cf3a32d 2237 sploitscan_0.2.0+git20240219.cf6360e-1.dsc
 cd53e71b2f8d53a754ace8441ee7ab1e83af2e34ebddcb3c9b02a787150c219d 16480 sploitscan_0.2.0+git20240219.cf6360e.orig.tar.xz
 2a631815cca1cef988ed3121b5a66d6fb702141618cb0c9c1706c5aa57bc26f8 3464 sploitscan_0.2.0+git20240219.cf6360e-1.debian.tar.xz
 29d4734366b805fa534e3589d3f65709ed3920b1567ffedb5b1b97c18676137f 10128 sploitscan_0.2.0+git20240219.cf6360e-1_all.deb
 3081e4b3df8edef6acc519c8801b276efb1ecde3f275540fb1df3d5f8f9efacc 9058 sploitscan_0.2.0+git20240219.cf6360e-1_amd64.buildinfo
Files:
 b8550369f5c5c74e804527f35105ac1a 2237 misc optional sploitscan_0.2.0+git20240219.cf6360e-1.dsc
 8252ff794d4cbf96b7d5a0a85a070d89 16480 misc optional sploitscan_0.2.0+git20240219.cf6360e.orig.tar.xz
 b83b3f553c0b60001c90107bf6595fb1 3464 misc optional sploitscan_0.2.0+git20240219.cf6360e-1.debian.tar.xz
 4575b6923c8ea4472d31f95d41aaba25 10128 misc optional sploitscan_0.2.0+git20240219.cf6360e-1_all.deb
 fd9beb551055b6be4c1705d8cfdb7b17 9058 misc optional sploitscan_0.2.0+git20240219.cf6360e-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6nrE
-----END PGP SIGNATURE-----

Attachment: pgpDW6kzLMsxG.pgp
Description: PGP signature


--- End Message ---

Reply to: