Releases: xaitax/SploitScan
v0.12.0
-
CVSS Parsing Enhancements
Updated theextract_cvss_info()
function to handle a broader range of CVSS fields: checks for CVSSv4.0, v3.1, v3.0, and v3 in that order, and then falls back to ADP entries if necessary. -
Date Parsing Unification
Introduced a newparse_iso_date()
helper. Replaced directdatetime.fromisoformat()
calls throughout the code with this function for consistent date formatting, including error handling for trailing Z characters. -
VulnCheck Key Handling
Improved error handling for the VulnCheck API key check—now returns a clearer error message if no VulnCheck key is configured. -
HTML Report Template Overhaul
Updated and reformatted the HTML export template for improved readability and consistency. Enhanced the layout for displaying references, exploit details, and the AI-powered risk assessment. Moved to a more standardized code style. -
Refined Public Exploits Display
Enhanced how exploit PoCs are sorted and displayed. -
Dependency Upgrades
Updatedrequests
(2.32.2 → 2.32.3),jinja2
(3.1.4 → 3.1.5), andopenai
(1.30.2 → 1.60.1) inrequirements.txt
. -
General Code Cleanup
- Organized imports and method parameters for clarity (e.g., specifying
params=
in all relevant requests). - Tweaked debug output for loading the configuration file, making it more verbose and consistent.
- Adjusted logic for selecting public exploits to be clearer and more maintainable.
- Organized imports and method parameters for clarity (e.g., specifying
v0.11.0
- Method Selection Added: Introduced a new
-m
argument to allow users to selectively run specific methods (e.g.,cisa
,epss
,hackerone
,ai
,prio
,references
). This enables more granular control over which data sources and assessments are retrieved for each CVE. - Import List Auto-Detection: Added functionality to automatically detect and handle plain text CVE lists when using the
-i
option without specifying an import type (-t
). If the file is detected as a plain text CVE list, it will import the CVE IDs directly without requiring a specific type. - CSV Export Fix: Fixed an issue where CISA data was not properly exported to CSV. Now, all relevant CISA information is included in the exported CSV file.
- HTML Export Fix: Resolved an issue where
NoneType
errors caused the HTML export to fail. Improved error handling to ensure that missing or empty data does not interrupt the export process.
v0.10.5
v0.10.4
v0.10.3
- Main Function Refactoring: Refactored the main function into smaller, modular functions to improve maintainability and readability.
- Public Exploit Display Enhancements: Reworked the public exploit display to include the total number of exploits and better error handling.
- Improved Error Handling: Enhanced error handling for API key configurations and data fetching, especially for VulnCheck.
v0.10.2
[30. June 2024] - Version 0.10.2
- Custom Configuration Path: Added support for specifying a custom configuration file path using the
--config
or-c
command-line argument. - Platform-Specific Directories: Added support for platform-specific (*nix, macOS, Windows) configuration directories.
- Debug Mode: Improved debug output for configuration file loading.
v0.10.1
v0.10.0
v0.9.1
- AI-Powered Risk Assessment: Integrated OpenAI for detailed risk assessments, potential attack scenarios, mitigation recommendations, and executive summaries (needs OpenAI API key).
- CVE Information Retrieval: Due to API rate limits and instabilities replaced NIST NVD with CVE Program.
- General Improvements: Various bug fixes and performance improvements.
v0.9
- AI-Powered Risk Assessment: Integrated OpenAI for detailed risk assessments, potential attack scenarios, mitigation recommendations, and executive summaries (needs OpenAI API key).
- CVE Information Retrieval: Due to API rate limits and instabilities replaced NIST NVD with CVE Program.
- General Improvements: Various bug fixes and performance improvements.