Backend component after component sharing - a Linux/FreeBSD vulnerability scanner vuls
background
Recently, we are exploring various common components and tools on the front-end, back-end, and system side, and reorganize some of the common components to form a standardized component topic, which will later include some commonly used components in various languages. Welcome everyone to continue to pay attention.
Component Basic Information
- Component: vuls
- Open source agreement: GPL-3.0 license
- Official website: vuls.io/
content
In this section we share a Linux/FreeBSD vulnerability scanner vuls
For system administrators, having to perform security vulnerability analysis and software updates on a daily basis can be a burden. To avoid downtime in production environments, system administrators often choose not to use the automatic update options provided by package managers and perform updates manually. This leads to the following problems.
- Sysadmins must be constantly on the lookout for any new vulnerabilities in the NVD (National Vulnerability Database) or similar databases.
- If a large number of software packages are installed on the server, the system administrator may not be able to monitor all the software.
- Performing analysis to determine which servers are affected by new vulnerabilities is costly. A server or two may have been overlooked during the analysis.
Vuls is a tool created to solve the above problems. It has the following characteristics.
- Notify users of system-related vulnerabilities.
- Notify users of affected servers.
- Vulnerability detection is done automatically to prevent any oversights.
- Generate reports periodically using CRON or other methods. Management Vulnerabilities.
For more information, please refer to the official documentation
This article declares:
This work is licensed by CN Hua Shao under the Creative Commons Attribution-Noncommercial 4.0 International License.