notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Current status

The server has been repaired, with a new power supply, for $23. I am waiting for lower COVID rates before visiting the datacenter to return it.
VUXML processing is halted. All vuln information is out of date.
Port details
py-gvm-tools The Greenbone Vulnerability Management Tools
20.10.1 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout Version of this port present on the latest quarterly branch.
Maintainer: acm@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2021-01-06 09:01:49
Last Update: 2021-01-06 10:11:55
SVN Revision: 560491
Also Listed In: python
License: GPLv3+
Description:
SVNWeb : Homepage

There is no configure plist information for this port.

  • ${PYTHON_PKGNAMEPREFIX}gvm-tools>0:security/py-gvm-tools@${PY_FLAVOR}
To install the port: cd /usr/ports/security/py-gvm-tools/ && make install clean
To add the package: pkg install py37-gvm-tools
PKGNAME: py37-gvm-tools
Package flavors (<flavor>: <package>)
  • py37: py37-gvm-tools
distinfo:
Packages: (move your mouse over the cells for more information)
py37-gvm-tools
ABIlatestquarterly
FreeBSD:11:aarch64--
FreeBSD:11:amd6420.10.1-
FreeBSD:11:armv6--
FreeBSD:11:i38620.10.1-
FreeBSD:11:mips--
FreeBSD:11:mips64--
FreeBSD:12:aarch64--
FreeBSD:12:amd6420.10.1-
FreeBSD:12:armv6--
FreeBSD:12:armv7--
FreeBSD:12:i38620.10.1-
FreeBSD:12:mips--
FreeBSD:12:mips64--
FreeBSD:12:powerpc64--
FreeBSD:13:aarch6420.10.1-
FreeBSD:13:amd6420.10.1-
FreeBSD:13:armv620.10.1-
FreeBSD:13:armv720.10.1-
FreeBSD:13:i38620.10.1-
FreeBSD:13:mips--
FreeBSD:13:mips64--
FreeBSD:13:powerpc6420.10.1-
 

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. py37-setuptools>0 : devel/py-setuptools@py37
  2. python3.7 : lang/python37
Runtime dependencies:
  1. py37-python-gvm>=0 : security/py-python-gvm@py37
  2. py37-setuptools>0 : devel/py-setuptools@py37
  3. python3.7 : lang/python37
This port is required by:
for Run
  1. security/gvm

Configuration Options

USES:

Master Sites:
Expand this list (2 items)
    Collapse this list.
  1. https://files.pythonhosted.org/packages/source/g/gvm-tools/
  2. https://pypi.org/packages/source/g/gvm-tools/
  3. Collapse this list.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2017-11-30
    Affects: */py*
    Author: mat@FreeBSD.org
    Reason: 
      Ports using Python via USES=python are now flavored.  All the py3-* ports
      have been removed and folded into their py-* master ports.
    
      People using Poudriere 3.2+ and binary packages do not have to do anything.
    
      For other people, to build the Python 3.6 version of, for example,
      databases/py-gdbm, you need to run:
    
        # make FLAVOR=py36 install
    
    

Number of commits found: 2

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
06 Jan 2021 10:11:55
Original commit files touched by this commit  20.10.1
Revision:560491
antoine search for other commits by this committer
Remove python 2.7 support from newly added ports
06 Jan 2021 09:01:33
Original commit files touched by this commit  20.10.1
Revision:560480
acm search for other commits by this committer
- New port: securty/py-gvm-tools

The Greenbone Vulnerability Management Tools gvm-tools are a collection of
tools that help with remote controlling a Greenbone Security Manager (GSM)
appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools
aid in accessing the communication protocols GMP (Greenbone Management
Protocol) and OSP (Open Scanner Protocol).

This module is comprised of interactive and non-interactive clients. The
programming language Python is supported directly for interactive scripting.
But it is also possible to issue remote GMP/OSP commands without programming
in Python.

WWW: https://github.com/greenbone/gvm-tools

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
dnsmasqJan 20
goJan 19
moinmoinJan 18
ghostscript9-agpl-baseJan 17
gitlab-ceJan 14
nodeJan 14
node10Jan 14
node12Jan 14
node14Jan 14
wavpackJan 14
jenkinsJan 13
jenkins-ltsJan 13
phpmyfaqJan 12
sudoJan 11
py-cairosvgJan 10

9 vulnerabilities affecting 70 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2021-01-26 20:33:26


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 42216
Broken 82
Deprecated 204
Ignore 317
Forbidden 4
Restricted 139
No CDROM 71
Vulnerable 18
Expired 41
Set to expire 179
Interactive 0
new 24 hours 18
new 48 hours19
new 7 days42
new fortnight87
new month303

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2021 Dan Langille. All rights reserved.