You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,18 @@
1
1
# 📆 Changelog
2
2
3
+
## [18. October 2025] - Version 0.14.2
4
+
5
+
-**Directory Import Feature**
6
+
Added support for importing CVE IDs from entire directories containing vulnerability reports. Use `--input-dir` to recursively scan directories and extract CVE IDs from all files. This complements the existing file import functionality and supports batch processing of multiple scanner reports.
7
+
8
+
-**Docker Improvements**
9
+
Updated Dockerfile to Python 3.13, added virtual environment setup, installed git for repository operations, and created a dedicated `/results` directory for exports.
10
+
11
+
-**Export Path Enhancement**
12
+
Modified export file generation to save results in `/results` directory when available.
13
+
14
+
*Special thanks to [diwskx](https://github.com/diwskx) for the directory import feature and Docker improvements.*
RUN pip install --no-cache-dir -r requirements.txt
3
+
LABEL version="0.14.2"
4
+
LABEL description="SploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability"
Copy file name to clipboardExpand all lines: README.md
+14-4Lines changed: 14 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,8 +50,8 @@ SploitScan is a powerful and user-friendly tool designed to streamline the proce
50
50
-**Multi-CVE Support and Export Options**
51
51
Work with multiple CVEs at once and export the results to HTML, JSON, or CSV formats.
52
52
53
-
-**Vulnerability Scanner Import**
54
-
Import scan results from popular vulnerability scanners (Nessus, Nexpose, OpenVAS, Docker) to directly search for known exploits.
53
+
-**Vulnerability Scanner Import**
54
+
Import scan results from popular vulnerability scanners (Nessus, Nexpose, OpenVAS, Docker) to directly search for known exploits. Now supports directory-based import with `--input-dir` for batch processing multiple reports.
55
55
56
56
-**Granular Method Selection**
57
57
Choose which specific data retrieval methods to run (such as CISA, EPSS, HackerOne, AI, etc.) so you only get the information you need.
@@ -180,9 +180,10 @@ options:
180
180
-m METHODS, --methods METHODS
181
181
Specify which methods to run, separated by commas (e.g., 'cisa,epss,hackerone,ai,prio,references').
182
182
-i IMPORT_FILE, --import-file IMPORT_FILE
183
-
Path to an import file. When provided, positional CVE IDs can be omitted. The file should be a plain text list with one CVE per line.
183
+
Path to an import file. When provided, positional CVE IDs can be omitted. The file should be a plain text list with one CVE per line.
184
+
--input-dir INPUT_DIR Path to a directory containing vulnerability reports to scan for CVE IDs.
184
185
-c CONFIG, --config CONFIG
185
-
Path to a custom configuration file.
186
+
Path to a custom configuration file.
186
187
-d, --debug Enable debug output.
187
188
```
188
189
@@ -277,6 +278,14 @@ Specify the type: 'nessus', 'nexpose', 'openvas', or 'docker' and provide the fi
0 commit comments