You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+26
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,31 @@
1
1
# 📆 Changelog
2
2
3
+
## [26. January 2025] - Version 0.12.0
4
+
5
+
-**CVSS Parsing Enhancements**
6
+
Updated the `extract_cvss_info()` function to handle a broader range of CVSS fields: checks for CVSSv4.0, v3.1, v3.0, and v3 in that order, and then falls back to ADP entries if necessary.
7
+
8
+
-**Date Parsing Unification**
9
+
Introduced a new `parse_iso_date()` helper. Replaced direct `datetime.fromisoformat()` calls throughout the code with this function for consistent date formatting, including error handling for trailing Z characters.
10
+
11
+
-**VulnCheck Key Handling**
12
+
Improved error handling for the VulnCheck API key check—now returns a clearer error message if no VulnCheck key is configured.
13
+
14
+
-**HTML Report Template Overhaul**
15
+
Updated and reformatted the HTML export template for improved readability and consistency. Enhanced the layout for displaying references, exploit details, and the AI-powered risk assessment. Moved to a more standardized code style.
16
+
17
+
-**Refined Public Exploits Display**
18
+
Enhanced how exploit PoCs are sorted and displayed.
19
+
20
+
-**Dependency Upgrades**
21
+
Updated `requests` (2.32.2 → 2.32.3), `jinja2` (3.1.4 → 3.1.5), and `openai` (1.30.2 → 1.60.1) in `requirements.txt`.
22
+
23
+
24
+
-**General Code Cleanup**
25
+
- Organized imports and method parameters for clarity (e.g., specifying `params=` in all relevant requests).
26
+
- Tweaked debug output for loading the configuration file, making it more verbose and consistent.
27
+
- Adjusted logic for selecting public exploits to be clearer and more maintainable.
28
+
3
29
## [05. September 2024] - Version 0.11.0
4
30
5
31
-**Method Selection Added**: Introduced a new `-m` argument to allow users to selectively run specific methods (e.g., `cisa`, `epss`, `hackerone`, `ai`, `prio`, `references`). This enables more granular control over which data sources and assessments are retrieved for each CVE.
Copy file name to clipboardExpand all lines: README.md
+16-12
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ pip install -r requirements.txt
73
73
pip install --user sploitscan
74
74
```
75
75
76
-
### Kali/Ubuntu/Debian
76
+
### Kali/Ubuntu/Debian (might not the latest version)
77
77
78
78
```shell
79
79
apt install sploitscan
@@ -86,18 +86,21 @@ apt install sploitscan
86
86
87
87
### Configuration File
88
88
89
-
Note: The OpenAI and VulnCheck API keys are optional. The OpenAI API key is used for AI-powered risk assessment, and the VulnCheck API key is used for VulnCheck data retrieval. If you do not intend to use these features, you can omit the configuration file or leave the API key fields blank.
89
+
SploitScan searches for a `config.json` in multiple locations by default. It will load the first valid file it finds, in this order:
90
90
91
-
Create a `config.json` file in one of the following locations with your API keys:
Specify which methods to run, separated by commas. Options: 'cisa', 'epss', 'hackerone', 'ai', 'prio', 'references', etc.
138
141
-i IMPORT_FILE, --import-file IMPORT_FILE
139
-
Path to an import file from a vulnerability scanner. If used, CVE IDs can be omitted from the command line arguments.
142
+
Path to an import file. If used, CVE IDs can be omitted from the command line arguments. Expected file type is a plain text file with one CVE per line. Vulnerability scanner
143
+
files can be imported also with the --type argument to specify the correct type
0 commit comments