You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- **Method Selection Added**: Introduced a new `-m` argument to allow users to selectively run specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, `prio`, `references`). This enables more granular control over which data sources and assessments are retrieved for each CVE.
- **Import List Auto-Detection**: Added functionality to automatically detect and handle plain text CVE lists when using the `-i` option without specifying an import type (`-t`). If the file is detected as a plain text CVE list, it will import the CVE IDs directly without requiring a specific type.
- **CSV Export Fix**: Fixed an issue where CISA data was not properly exported to CSV. Now, all relevant CISA information is included in the exported CSV file.
- **HTML Export Fix**: Resolved an issue where `NoneType` errors caused the HTML export to fail. Improved error handling to ensure that missing or empty data does not interrupt the export process.
Copy file name to clipboardExpand all lines: CHANGELOG.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,12 @@
1
1
# 📆 Changelog
2
2
3
+
## [05. September 2024] - Version 0.11.0
4
+
5
+
-**Method Selection Added**: Introduced a new `-m` argument to allow users to selectively run specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, `prio`, `references`). This enables more granular control over which data sources and assessments are retrieved for each CVE.
6
+
-**Import List Auto-Detection**: Added functionality to automatically detect and handle plain text CVE lists when using the `-i` option without specifying an import type (`-t`). If the file is detected as a plain text CVE list, it will import the CVE IDs directly without requiring a specific type.
7
+
-**CSV Export Fix**: Fixed an issue where CISA data was not properly exported to CSV. Now, all relevant CISA information is included in the exported CSV file.
8
+
-**HTML Export Fix**: Resolved an issue where `NoneType` errors caused the HTML export to fail. Improved error handling to ensure that missing or empty data does not interrupt the export process.
9
+
3
10
## [13. August 2024] - Version 0.10.5
4
11
5
12
-**General Improvements**: Prevent IndexError by checking for non-empty lists before accessing elements.
@@ -32,6 +36,7 @@ SploitScan is a powerful and user-friendly tool designed to streamline the proce
32
36
-**Patching Priority System**: Evaluates and assigns a priority rating for patching based on various factors including public exploits availability.
33
37
-**Multi-CVE Support and Export Options**: Supports multiple CVEs in a single run and allows exporting the results to HTML, JSON and CSV formats.
34
38
-**Vulnerability Scanner Import**: Import vulnerability scans from popular vulnerability scanners and search directly for known exploits.
39
+
-**Granular Method Selection**: Only specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, etc.), giving you control over what data you want to retrieve.
35
40
-**User-Friendly Interface**: Easy to use, providing clear and concise information.
36
41
-**Comprehensive Security Tool**: Ideal for quick security assessments and staying informed about recent vulnerabilities.
37
42
@@ -74,8 +79,15 @@ pip install --user sploitscan
74
79
apt install sploitscan
75
80
```
76
81
82
+
### Obtaining API Keys
83
+
84
+
-**VulnCheck**: Sign up for a free account at [VulnCheck](https://vulncheck.com/) to get your API key.
85
+
-**OpenAI**: Create an account and get an API key at [OpenAI](https://platform.openai.com/signup/).
86
+
77
87
### Configuration File
78
88
89
+
Note: The OpenAI and VulnCheck API keys are optional. The OpenAI API key is used for AI-powered risk assessment, and the VulnCheck API key is used for VulnCheck data retrieval. If you do not intend to use these features, you can omit the configuration file or leave the API key fields blank.
90
+
79
91
Create a `config.json` file in one of the following locations with your API keys:
To run only specific data retrieval methods (e.g., CISA, EPSS, AI risk assessment), use the `-m` argument:
168
+
169
+
```bash
170
+
sploitscan CVE-2024-1709 -m cisa,epss
171
+
```
172
+
151
173
### Export Results
152
174
153
175
Specify the export format: 'json', 'csv', or 'html'.
@@ -158,6 +180,10 @@ sploitscan CVE-2024-1709 -e html
158
180
159
181
### Docker
160
182
183
+
Ensure you have Docker installed. For installation instructions, see [Docker's official installation guide](https://docs.docker.com/get-docker/).
184
+
185
+
To build and run SploitScan in Docker:
186
+
161
187
```shell
162
188
docker build -t sploitscan .
163
189
docker run --rm sploitscan CVE-2024-1709
@@ -257,7 +283,7 @@ This system assists users in making informed decisions on which vulnerabilities
257
283
258
284
## 🫱🏼🫲🏽 Contributing
259
285
260
-
Contributions are welcome. Please feel free to fork, modify, and make pull requests or report issues.
286
+
Contributions are welcome! Whether it's fixing bugs, adding new features, or improving the documentation, feel free to fork the repository and submit a pull request. You can also report issues or suggest enhancements through the GitHub issue tracker.
0 commit comments