You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+17-8Lines changed: 17 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,11 @@ SploitScan is a powerful and user-friendly tool designed to streamline the proce
27
27
-**EPSS Integration**: Includes Exploit Prediction Scoring System (EPSS) data, offering a probability score for the likelihood of CVE exploitation, aiding in prioritization.
28
28
-**Public Exploits Aggregation**: Gathers publicly available exploits, enhancing the understanding of vulnerabilities.
29
29
-**CISA KEV**: Shows if the CVE has been listed in the Known Exploited Vulnerabilities (KEV) of CISA.
30
+
-**AI-Powered Risk Assessment**: Leverages OpenAI to provide detailed risk assessments, potential attack scenarios, mitigation recommendations, and executive summaries.
31
+
-**HackerOne Reports**: Shows if the CVE was used within HackerOne Bug Bounty programs and their total rank overall.
30
32
-**Patching Priority System**: Evaluates and assigns a priority rating for patching based on various factors including public exploits availability.
31
33
-**Multi-CVE Support and Export Options**: Supports multiple CVEs in a single run and allows exporting the results to HTML, JSON and CSV formats.
32
34
-**Vulnerability Scanner Import**: Import vulnerability scans from popular vulnerability scanners and search directly for known exploits.
33
-
-**AI-Powered Risk Assessment**: Leverages OpenAI to provide detailed risk assessments, potential attack scenarios, mitigation recommendations, and executive summaries.
34
35
-**User-Friendly Interface**: Easy to use, providing clear and concise information.
35
36
-**Comprehensive Security Tool**: Ideal for quick security assessments and staying informed about recent vulnerabilities.
SploitScan: Retrieve and display vulnerability data as well as public exploits for given CVE ID(s).
106
107
@@ -116,6 +117,7 @@ options:
116
117
Specify the type of the import file: 'nessus', 'nexpose', 'openvas' or 'docker'.
117
118
-i IMPORT_FILE, --import-file IMPORT_FILE
118
119
Path to an import file from a vulnerability scanner. If used, CVE IDs can be omitted from the command line arguments.
120
+
-d, --debug Enable debug output.
119
121
```
120
122
121
123
### Single CVE Query
@@ -247,6 +249,11 @@ This system assists users in making informed decisions on which vulnerabilities
247
249
248
250
## 📆 Changelog
249
251
252
+
### [26. June 2024] - Version 0.10
253
+
254
+
- **HackerOne Integration**: Added support forsearching through HackerOne and displays if the CVE was usedin any Bug Bounty program including its rank.
255
+
- **General Improvements**: Various bug fixes.
256
+
250
257
### [24. May 2024] - Version 0.9
251
258
252
259
- **AI-Powered Risk Assessment**: Integrated OpenAI for detailed risk assessments, potential attack scenarios, mitigation recommendations, and executive summaries (needs OpenAI API key).
@@ -329,12 +336,14 @@ Special thanks to:
329
336
330
337
## 📚 References
331
338
339
+
- [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
description = "SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits."
<td>{{ cve['Priority']['Priority'] if cve['Priority'] and cve['Priority']['Priority'] else 'N/A' }}</td>
262
+
<td>Rank</td>
263
+
<td>{{ cve['HackerOne Data']['data']['cve_entry']['rank'] if cve['HackerOne Data'] and cve['HackerOne Data'].get('data') and cve['HackerOne Data']['data'].get('cve_entry') else 'N/A' }}</td>
264
+
</tr>
265
+
<tr>
266
+
<td>Reports Submitted</td>
267
+
<td>{{ cve['HackerOne Data']['data']['cve_entry']['reports_submitted_count'] if cve['HackerOne Data'] and cve['HackerOne Data'].get('data') and cve['HackerOne Data']['data'].get('cve_entry') else 'N/A' }}</td>
0 commit comments