From 771dc36bbb5857c85f94bc25425f3197f3870d47 Mon Sep 17 00:00:00 2001 From: AlaBouali Date: Sun, 26 Nov 2023 19:16:08 +0100 Subject: [PATCH] fix vulners search --- bane/__init__.py | 2 +- bane/scanners/vulnerabilities/vulner_search.py | 8 ++++++-- setup.py | 2 +- 3 files changed, 8 insertions(+), 4 deletions(-) diff --git a/bane/__init__.py b/bane/__init__.py index ada634f..416bfcc 100644 --- a/bane/__init__.py +++ b/bane/__init__.py @@ -1,7 +1,7 @@ #coding: utf-8 -__version__='5.1.3' +__version__='5.1.4' __author__="Ala Bouali" diff --git a/bane/scanners/vulnerabilities/vulner_search.py b/bane/scanners/vulnerabilities/vulner_search.py index 703b05e..2335309 100644 --- a/bane/scanners/vulnerabilities/vulner_search.py +++ b/bane/scanners/vulnerabilities/vulner_search.py @@ -103,7 +103,8 @@ def scan_cpe( http_proxies=None, socks4_proxies=None, socks5_proxies=None, - proxy=None + proxy=None, + basic_only=True ): proxies=Proxies_Interface.get_requests_proxies_from_parameters(http_proxies=http_proxies,socks4_proxies=socks4_proxies,socks5_proxies=socks5_proxies) if proxy==None: @@ -164,7 +165,10 @@ def scan_cpe( ] ) i += 1 - return l + if basic_only==False: + return l + else: + return [{'title':x.get('title',''),'description':x.get('description',''),'href':x.get('href',''),'sourceHref':x.get('sourceHref',''),'published':x.get('published','')} for x in l] else: return []#{'error':"couldn't find vulnerabilities for this version"} except: diff --git a/setup.py b/setup.py index df8ae73..f0f2b58 100644 --- a/setup.py +++ b/setup.py @@ -81,7 +81,7 @@ setuptools.setup( name="bane", - version="5.1.3", + version="5.1.4", author="AlaBouali", author_email="ala.bouali.1997@gmail.com", description='This Python library offers a comprehensive set of tools for various cybersecurity and networking tasks. Its functionalities encompass diverse capabilities such as bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, CMS vulnerability scanning, network discovery, vulnerability scanning, useful modules for common tasks, web page analyzers, and proxy utilities making it a powerful toolkit for cybersecurity professionals and network administrators.',