lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAO5w5vYvJkmDh9Rzg=07KCF5uuWpBZYMw7sOGt6OOFwFk8Dfwg@mail.gmail.com> Date: Tue, 20 Feb 2018 07:18:22 -0500 From: cr0hn <cr0hn@...hn.com> To: fulldisclosure@...lists.org Subject: [FD] [Project] Patton: The clever vulnerability knowledge store Dear colleagues, Please, let me to introduce Patton project: - Patton-Server: https://github.com/BBVA/patton-server - Patton-CLI: https://github.com/BBVA/patton-cli Patton is project that store the vulnerability information (CVEs) and link it with product details (CPE) and allow to ask in a **very clever way**. What that mean? Patton can **deduce** the CVEs from an imprecise product name. It’s useful to detect vulnerabilities without do any security test. Patton CLI has many recipes to detect vulnerabilities for Ubuntu, Alpine, Brew or Python. Of course, any suggestion to the project are welcome. Best regards --- Daniel García (cr0hn) Security researcher and ethical hacker Personal site: http://cr0hn.com Linkedin: https://www.linkedin.com/in/garciagarciadaniel Twitter: @ggdaniel _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists