dawnscanner 1.2.99
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- checksums.yaml.gz.sig +4 -0
- data.tar.gz.sig +0 -0
- data/.gitignore +19 -0
- data/.ruby-gemset +1 -0
- data/.ruby-version +1 -0
- data/.travis.yml +8 -0
- data/Changelog.md +412 -0
- data/Gemfile +4 -0
- data/KnowledgeBase.md +213 -0
- data/LICENSE.txt +22 -0
- data/README.md +354 -0
- data/Rakefile +250 -0
- data/Roadmap.md +59 -0
- data/bin/dawn +210 -0
- data/certs/paolo_at_codesake_dot_com.pem +21 -0
- data/checksum/.placeholder +0 -0
- data/checksum/codesake-dawn-1.1.0.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.0.rc1.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.1.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.2.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.3.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.2.0.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.2.99.gem.sha512 +1 -0
- data/dawnscanner.gemspec +43 -0
- data/doc/codesake-dawn.yaml.sample +26 -0
- data/doc/dawn_1_0_announcement.md +139 -0
- data/doc/dawn_1_1_announcement.md +67 -0
- data/doc/dawn_1_2_announcement.md +69 -0
- data/features/dawn_complains_about_an_incorrect_command_line.feature.disabled +21 -0
- data/features/dawn_scan_a_secure_sinatra_app.feature.disabled +31 -0
- data/features/dawn_scan_a_vulnerable_sinatra_app.feature.disabled +36 -0
- data/features/step_definition/dawn_steps.rb +19 -0
- data/features/support/env.rb +1 -0
- data/lib/codesake-dawn.rb +12 -0
- data/lib/codesake/dawn/core.rb +175 -0
- data/lib/codesake/dawn/engine.rb +380 -0
- data/lib/codesake/dawn/gemfile_lock.rb +12 -0
- data/lib/codesake/dawn/kb/basic_check.rb +228 -0
- data/lib/codesake/dawn/kb/combo_check.rb +64 -0
- data/lib/codesake/dawn/kb/cve_2004_0755.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2004_0983.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2005_1992.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2005_2337.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2006_1931.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2006_2582.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2006_3694.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2006_4112.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2006_5467.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2006_6303.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2006_6852.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2006_6979.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2007_0469.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2007_5162.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2007_5379.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2007_5380.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2007_5770.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2007_6077.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2007_6612.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2008_1145.rb +40 -0
- data/lib/codesake/dawn/kb/cve_2008_1891.rb +40 -0
- data/lib/codesake/dawn/kb/cve_2008_2376.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2008_2662.rb +35 -0
- data/lib/codesake/dawn/kb/cve_2008_2663.rb +34 -0
- data/lib/codesake/dawn/kb/cve_2008_2664.rb +35 -0
- data/lib/codesake/dawn/kb/cve_2008_2725.rb +33 -0
- data/lib/codesake/dawn/kb/cve_2008_3655.rb +39 -0
- data/lib/codesake/dawn/kb/cve_2008_3657.rb +39 -0
- data/lib/codesake/dawn/kb/cve_2008_3790.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2008_3905.rb +38 -0
- data/lib/codesake/dawn/kb/cve_2008_4094.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2008_4310.rb +103 -0
- data/lib/codesake/dawn/kb/cve_2008_5189.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2008_7248.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2009_4078.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2009_4124.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2009_4214.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2010_1330.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2010_2489.rb +62 -0
- data/lib/codesake/dawn/kb/cve_2010_3933.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_0188.rb +69 -0
- data/lib/codesake/dawn/kb/cve_2011_0446.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_0447.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_0739.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_0995.rb +63 -0
- data/lib/codesake/dawn/kb/cve_2011_1004.rb +36 -0
- data/lib/codesake/dawn/kb/cve_2011_1005.rb +33 -0
- data/lib/codesake/dawn/kb/cve_2011_2197.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_2686.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_2705.rb +34 -0
- data/lib/codesake/dawn/kb/cve_2011_2929.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_2930.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_2931.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2011_2932.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_3009.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_3186.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_3187.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_4319.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_4815.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_5036.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_1098.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2012_1099.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_1241.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_2139.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_2140.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_2660.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_2661.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_2671.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_2694.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2012_2695.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_3424.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2012_3463.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_3464.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_3465.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_4464.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_4466.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_4481.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_4522.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_5370.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_5371.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_5380.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_6109.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2012_6134.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_6496.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_6497.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0155.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_0156.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0162.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0175.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0183.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_0184.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_0233.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_0256.rb +61 -0
- data/lib/codesake/dawn/kb/cve_2013_0262.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_0263.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_0269.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0276.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0277.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_0284.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0285.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0333.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1607.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_1655.rb +67 -0
- data/lib/codesake/dawn/kb/cve_2013_1656.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1756.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1800.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1801.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1802.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1812.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1821.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1854.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1855.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_1856.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1857.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1875.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1898.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1911.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1933.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1947.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1948.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2065.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_2090.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_2105.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_2119.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2512.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_2513.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_2516.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_2615.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2616.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2617.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_3221.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_4164.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2013_4203.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_4389.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4413.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_4457.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_4478.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4479.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4489.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_4491.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_4492.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_4562.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_4593.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_5647.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_5671.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_6414.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_6415.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6416.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_6417.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_6421.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6459.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6460.rb +55 -0
- data/lib/codesake/dawn/kb/cve_2013_6461.rb +59 -0
- data/lib/codesake/dawn/kb/cve_2013_7086.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_0036.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_0080.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2014_0081.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_0082.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_0130.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_1233.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_1234.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_2322.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2014_2525.rb +61 -0
- data/lib/codesake/dawn/kb/cve_2014_2538.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_3482.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2014_3483.rb +29 -0
- data/lib/codesake/dawn/kb/dependency_check.rb +86 -0
- data/lib/codesake/dawn/kb/deprecation_check.rb +40 -0
- data/lib/codesake/dawn/kb/not_revised_code.rb +24 -0
- data/lib/codesake/dawn/kb/operating_system_check.rb +98 -0
- data/lib/codesake/dawn/kb/osvdb_105971.rb +31 -0
- data/lib/codesake/dawn/kb/osvdb_108530.rb +29 -0
- data/lib/codesake/dawn/kb/osvdb_108563.rb +30 -0
- data/lib/codesake/dawn/kb/osvdb_108569.rb +30 -0
- data/lib/codesake/dawn/kb/osvdb_108570.rb +29 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet.rb +41 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/check_for_backup_files.rb +22 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/check_for_safe_redirect_and_forward.rb +59 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/command_injection.rb +30 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/csrf.rb +31 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/mass_assignment_in_model.rb +35 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/security_related_headers.rb +38 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/sensitive_files.rb +31 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/session_stored_in_database.rb +33 -0
- data/lib/codesake/dawn/kb/pattern_match_check.rb +129 -0
- data/lib/codesake/dawn/kb/ruby_version_check.rb +91 -0
- data/lib/codesake/dawn/kb/simpleform_xss_20131129.rb +30 -0
- data/lib/codesake/dawn/kb/version_check.rb +418 -0
- data/lib/codesake/dawn/knowledge_base.rb +513 -0
- data/lib/codesake/dawn/padrino.rb +82 -0
- data/lib/codesake/dawn/rails.rb +17 -0
- data/lib/codesake/dawn/railtie.rb +9 -0
- data/lib/codesake/dawn/reporter.rb +280 -0
- data/lib/codesake/dawn/sinatra.rb +129 -0
- data/lib/codesake/dawn/tasks.rb +27 -0
- data/lib/codesake/dawn/utils.rb +21 -0
- data/lib/codesake/dawn/version.rb +28 -0
- data/lib/tasks/codesake-dawn_tasks.rake +1 -0
- data/spec/lib/dawn/codesake_core_spec.rb +9 -0
- data/spec/lib/dawn/codesake_knowledgebase_spec.rb +940 -0
- data/spec/lib/dawn/codesake_padrino_engine_disabled.rb +45 -0
- data/spec/lib/dawn/codesake_rails_engine_disabled.rb +12 -0
- data/spec/lib/dawn/codesake_sinatra_engine_disabled.rb +128 -0
- data/spec/lib/kb/codesake_cve_2013_0175_spec.rb +35 -0
- data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +41 -0
- data/spec/lib/kb/codesake_dependency_version_check_spec.rb +76 -0
- data/spec/lib/kb/codesake_deprecation_check_spec.rb +56 -0
- data/spec/lib/kb/codesake_ruby_version_check_spec.rb +40 -0
- data/spec/lib/kb/codesake_version_check_spec.rb +165 -0
- data/spec/lib/kb/cve_2011_2705_spec.rb +35 -0
- data/spec/lib/kb/cve_2011_2930_spec.rb +31 -0
- data/spec/lib/kb/cve_2011_3009_spec.rb +25 -0
- data/spec/lib/kb/cve_2011_3187_spec.rb +24 -0
- data/spec/lib/kb/cve_2011_4319_spec.rb +44 -0
- data/spec/lib/kb/cve_2011_5036_spec.rb +95 -0
- data/spec/lib/kb/cve_2012_1098_spec.rb +36 -0
- data/spec/lib/kb/cve_2012_2139_spec.rb +20 -0
- data/spec/lib/kb/cve_2012_2671_spec.rb +23 -0
- data/spec/lib/kb/cve_2012_6109_spec.rb +112 -0
- data/spec/lib/kb/cve_2013_0162_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_0183_spec.rb +54 -0
- data/spec/lib/kb/cve_2013_0184_spec.rb +115 -0
- data/spec/lib/kb/cve_2013_0256_spec.rb +34 -0
- data/spec/lib/kb/cve_2013_0262_spec.rb +44 -0
- data/spec/lib/kb/cve_2013_0263_spec.rb +11 -0
- data/spec/lib/kb/cve_2013_1607_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_1655_spec.rb +31 -0
- data/spec/lib/kb/cve_2013_1756_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_2090_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_2105_spec.rb +11 -0
- data/spec/lib/kb/cve_2013_2119_spec.rb +27 -0
- data/spec/lib/kb/cve_2013_2512_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_2513_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_2516_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_4203_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_4413_spec.rb +16 -0
- data/spec/lib/kb/cve_2013_4489_spec.rb +63 -0
- data/spec/lib/kb/cve_2013_4593_spec.rb +16 -0
- data/spec/lib/kb/cve_2013_5647_spec.rb +19 -0
- data/spec/lib/kb/cve_2013_5671_spec.rb +27 -0
- data/spec/lib/kb/cve_2013_6416_spec.rb +31 -0
- data/spec/lib/kb/cve_2013_6459_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_7086_spec.rb +22 -0
- data/spec/lib/kb/cve_2014_0036_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_0080_spec.rb +28 -0
- data/spec/lib/kb/cve_2014_0081_spec.rb +68 -0
- data/spec/lib/kb/cve_2014_0082_spec.rb +52 -0
- data/spec/lib/kb/cve_2014_0130_spec.rb +19 -0
- data/spec/lib/kb/cve_2014_1233_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_1234_spec.rb +16 -0
- data/spec/lib/kb/cve_2014_2322_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_2538_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_3482_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_3483_spec.rb +23 -0
- data/spec/lib/kb/osvdb_105971_spec.rb +15 -0
- data/spec/lib/kb/osvdb_108530_spec.rb +22 -0
- data/spec/lib/kb/osvdb_108563_spec.rb +18 -0
- data/spec/lib/kb/osvdb_108569_spec.rb +17 -0
- data/spec/lib/kb/osvdb_108570_spec.rb +17 -0
- data/spec/lib/kb/owasp_ror_cheatsheet_disabled.rb +56 -0
- data/spec/spec_helper.rb +11 -0
- data/support/bootstrap.js +2027 -0
- data/support/bootstrap.min.css +9 -0
- data/support/codesake.css +63 -0
- metadata +659 -0
- metadata.gz.sig +0 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 96652166e96b4230261eedd3e31210b1629936de
|
4
|
+
data.tar.gz: 094ed8dd07f42d69b6d3792f427aaab9dc048654
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: a1563bc6716a6d525697af3551211ef7403d11249bdf493aa86b0e63a16751018898aeed7186f85cc572de867d0420757982bba3580e9adcd915a21ac79f7131
|
7
|
+
data.tar.gz: c5268d7a968d472c144fa17bb86795dc2e2d0e970db5e2575672345d5721735da35c2716669f976661fd04642a209343a1a1d8213db9cdf61a0b57e51af53903
|
checksums.yaml.gz.sig
ADDED
data.tar.gz.sig
ADDED
Binary file
|
data/.gitignore
ADDED
data/.ruby-gemset
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
codesake
|
data/.ruby-version
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
2.0.0
|
data/.travis.yml
ADDED
data/Changelog.md
ADDED
@@ -0,0 +1,412 @@
|
|
1
|
+
# Codesake Dawn - changelog
|
2
|
+
|
3
|
+
Codesake::Dawn is a static analysis security scanner for ruby written web applications.
|
4
|
+
It supports [Sinatra](http://www.sinatrarb.com),
|
5
|
+
[Padrino](http://www.padrinorb.com) and [Ruby on Rails](http://rubyonrails.org)
|
6
|
+
frameworks.
|
7
|
+
|
8
|
+
_latest update: Fri Jul 11 18:06:30 CEST 2014_
|
9
|
+
|
10
|
+
## Version 1.2.99 - codename: Lightning McQueen (2015-01-07)
|
11
|
+
|
12
|
+
* Add a deprecation message. This is the last codesake-dawn release. New gem
|
13
|
+
will be called dawnscanner.
|
14
|
+
|
15
|
+
## Version 1.2.0 - codename: Lightning McQueen (2014-07-14)
|
16
|
+
|
17
|
+
* Adding a check for OSVDB-108569: information disclosure in backup_checksum
|
18
|
+
gem (issue #69)
|
19
|
+
* Fix issue #74. Now BasicChack has its own cve, osvdb attributes and a rake
|
20
|
+
task will perform a sanity check if those values have been initialized
|
21
|
+
* Fix issue #62 about codesake-dawn config filename
|
22
|
+
* Adding a check for CVE-2013-2105: HTML injection in show_in_browser rubygem
|
23
|
+
* Fixing issue #68. I moved some file variable operation after the check for
|
24
|
+
nil value. I can't reproduce on my station the offending bug :-(
|
25
|
+
* Adding a check for OSVDB-108570: arbitrary command execution for
|
26
|
+
backup_checksum gem (issue #70)
|
27
|
+
* Adding a check for OSVDB-108530: remote code execution for kajam gem (issue
|
28
|
+
#71)
|
29
|
+
* Adding a check for OSVDB-108563: remote code execution in gyazo rubygem
|
30
|
+
(issue #72)
|
31
|
+
* Adding a check for CVE-2014-3482: SQL Injection on Rails 3.2.x due to
|
32
|
+
PostgreSQL adapter for active record (issue #73)
|
33
|
+
* Adding a check for CVE-2014-3483: Ruby on Rails 4.x SQL Injection due to
|
34
|
+
PostgreSQL adapter (issue #75)
|
35
|
+
* Fix issue #76 about codesake-dawn gem name being changed. On November 1st,
|
36
|
+
2014 we will rename the codesake-dawn name to just 'dawn' cleaning up also
|
37
|
+
the namespace.
|
38
|
+
|
39
|
+
## Version 1.1.3 - codename: Lightning McQueen (2014-05-06)
|
40
|
+
|
41
|
+
* Adding a check for CVE-2014-0130: directory traversal for ruby on rails
|
42
|
+
|
43
|
+
## Version 1.1.2 - codename: Lightning McQueen (2014-04-22)
|
44
|
+
|
45
|
+
* Adding a check for OSVDB-105971: remote code execution for sfpagent ruby gem
|
46
|
+
|
47
|
+
## Version 1.1.1 - codename: Lightning McQueen (2014-04-11)
|
48
|
+
|
49
|
+
* Fixing issue #52. The trailing '/' must be removed in File.exist? A begin -
|
50
|
+
rescue block was added so to handle any exception. The default configuration
|
51
|
+
is returned in case of error.
|
52
|
+
* Fixed issue #53. Both get_rbenv_ruby_ver and get_rvm_ruby_ver doesn't prepand
|
53
|
+
@target when trying to fetch ruby version file content.
|
54
|
+
* Fix issue #54. There were some unconsistence in command line call when
|
55
|
+
forcing the MVC instead of autodetect it. I refactored the part and it was
|
56
|
+
back to work now.
|
57
|
+
* Fixed issue #55. Introducing yaml config file, gemfile_name default value is
|
58
|
+
empty string not nil anymore. Therefore bin/dawn must check for emptyness not
|
59
|
+
for nil value.
|
60
|
+
* Issue #57: @zoltrain made a pull request to add vulnerability properties to
|
61
|
+
json output in reporter class.
|
62
|
+
* Issue #38. During the discussion, @shaneog pointed out that
|
63
|
+
--disable-ror-cheatsheet flag worked but disabling the whole family from the
|
64
|
+
YAML config file didn't. Due to a silly typo the magic didn't happened. Fixed
|
65
|
+
now.
|
66
|
+
|
67
|
+
## Version 1.1.0 - codename: Lightning McQueen (2014-04-04)
|
68
|
+
|
69
|
+
* Added a check for CVE-2011-5036
|
70
|
+
* Added a check for CVE-2012-6109
|
71
|
+
* Added a check for CVE-2013-0183
|
72
|
+
* Added a check for CVE-2013-0184
|
73
|
+
* Added a check for CVE-2013-0262
|
74
|
+
* Added a check for CVE-2013-1607
|
75
|
+
* Added a check for CVE-2013-2512
|
76
|
+
* Added a check for CVE-2013-2513
|
77
|
+
* Added a check for CVE-2013-2516
|
78
|
+
* Added a check for CVE-2013-4203
|
79
|
+
* Added a check for CVE-2013-4413
|
80
|
+
* Added a check for CVE-2013-4489
|
81
|
+
* Added a check for CVE-2013-4593
|
82
|
+
* Added a check for CVE-2013-5671
|
83
|
+
* Added a check for CVE-2014-0080
|
84
|
+
* Added a check for CVE-2014-2525
|
85
|
+
* Added remaining compliance checks against Owasp Ruby on Rails cheatsheet.
|
86
|
+
Some other checks in the cheatsheet can't be turned into a Codesake::Dawn
|
87
|
+
test, so all the cheatsheet content is covered since now.
|
88
|
+
* Added a --ascii-tabular-report (-a) to produce a report formatted with ascii
|
89
|
+
tables. A bit of bin/dawn refactoring was necessary.
|
90
|
+
* Added a --json (-j) to produce JSON reports
|
91
|
+
* Added a --html (-h) to produce HTML reports
|
92
|
+
* Added a --file (-F) flag to save report to supplied filename
|
93
|
+
* Added Codesake::Dawn gem signature as described in
|
94
|
+
http://guides.rubygems.org/security/. README is modified accordingly with new
|
95
|
+
installation suggestions. Added also gem SHA512 checksum in repository.
|
96
|
+
* Added a not_affected attribute to dependency check to flag as not vulnerable
|
97
|
+
previous versions
|
98
|
+
* CVE-2013-2090: we were uncertain about previous cremefraiche version if they
|
99
|
+
were vulnerable or not. Gem author, yanked all previous version but the
|
100
|
+
latest released 29 January 2014. We removed the rspec check for version <
|
101
|
+
0.6.x
|
102
|
+
* basic_check.rb: due to the great @rubysec guys work, the link to their site
|
103
|
+
is provided as well. True to be told, there are some CVE valid but not found
|
104
|
+
on NVID website, so having @rubysec link is even more accurate in those
|
105
|
+
situations.
|
106
|
+
* New Codesake::Dawn::Kb::VersionCheck class to provide version specific
|
107
|
+
checks, supporting beta version number, release candidate and pre. Fully
|
108
|
+
integrated with DepedencyCheck and RubyVersionCheck
|
109
|
+
* Issue #34. I added a deprecation check. However I haven't found an official
|
110
|
+
link saying which are MVC gem version to be considered officially deprecated
|
111
|
+
or just old. I enabled only check against ruby
|
112
|
+
* Added a --seach-knowledge-base removing the optional parameter to
|
113
|
+
--list-knowledge-base that is just for listing.
|
114
|
+
* Renamed '--list-knowledgebase' to '--list-knowledge-base' and '-k' short
|
115
|
+
option was removed
|
116
|
+
* Added a --list-known-families option printing out Codesake::Dawn supported
|
117
|
+
check family name
|
118
|
+
* Removed '-f' short option for list-known-framework
|
119
|
+
* Added family and severity to Owasp RoR Cheatsheet files
|
120
|
+
* Add a method to return severity level. If it's provided by check constructor
|
121
|
+
then that value is used, otherwise is calculated using CVSS. If no value and
|
122
|
+
no CVSS are available the return value is "unknown".
|
123
|
+
* Removed old ruby version check from BasicCheck. It's outdated and no longer
|
124
|
+
needed
|
125
|
+
* Added --disable-cve-bulletins flag to disable all CVE security checks
|
126
|
+
* Added --disable-code-quality flag to disable all code quality checks
|
127
|
+
* Added --disable-code-style flag to disable all code style checks
|
128
|
+
* Added --disable-owasp-ror-cheatsheet flag to disable all Owasp Ruby on Rails
|
129
|
+
cheatsheet checks
|
130
|
+
* Added --disable-owasp-top-10 flag to disable all Owasp Top 10 checks
|
131
|
+
* Revamped help output
|
132
|
+
* Added YAML Codesake::Dawn configuration support. Now you can specify your
|
133
|
+
preferences in a .codesake-dawn.yaml file in your home directory (or you can
|
134
|
+
use the --config-file option to specify the file you want to use). It returns
|
135
|
+
an embedded default configuration if the supplied filename doesn't exist.
|
136
|
+
* Nokogiri DoS security checks discovered in December 2013, now have their own
|
137
|
+
CVE: CVE-2013-6460 and CVE-2013-6461
|
138
|
+
|
139
|
+
## Version 1.0.6 - codename: Lightning McQueen (2014-03-23)
|
140
|
+
|
141
|
+
* Added a check for CVE-2014-2538
|
142
|
+
|
143
|
+
## Version 1.0.5 - codename: Lightning McQueen (2014-03-18)
|
144
|
+
|
145
|
+
* Added a check for CVE-2014-2322
|
146
|
+
* Added a check for CVE-2014-0036
|
147
|
+
|
148
|
+
## Version 1.0.4 - codename: Lightning McQueen (2014-03-14)
|
149
|
+
|
150
|
+
* Backporting of some CVEs introduced in 2014 from the development branch.
|
151
|
+
Since it will take some time to improve dawn 1.1 and since I forgot to merge
|
152
|
+
some useful CVE released since January also in master, I do it know. Please
|
153
|
+
note that, due to a big change in DependencyCheck class the check against
|
154
|
+
CVE-2014-0080 will be only available with dawn 1.1.
|
155
|
+
|
156
|
+
Backported checks are:
|
157
|
+
+ CVE-2014-1233: The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.
|
158
|
+
+ CVE-2014-1234: The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
|
159
|
+
+ CVE-2014-0081: Multiple cross-site scripting (XSS) vulnerabilities in rails
|
160
|
+
+ CVE-2014-0082: Denial of service in Rails before 3.2.17
|
161
|
+
|
162
|
+
New security checks are for Owasp ROR Cheatsheet:
|
163
|
+
+ Check for safe redirect and forward
|
164
|
+
+ Check for sensitive file
|
165
|
+
|
166
|
+
## Version 1.0.3 - codename: Lightning McQueen (2014-02-13)
|
167
|
+
|
168
|
+
* Fixing issue #37. Now the rake task is successfully loaded when you require
|
169
|
+
the 'codesake/dawn/tasks' path. The task is dawn:run.
|
170
|
+
|
171
|
+
## Version 1.0.2 - codename: Lightning McQueen (2014-01-27)
|
172
|
+
|
173
|
+
* Fixing issue #27. With rainbow gem version 2.0.0 there is an exception while
|
174
|
+
codesake-commons logging facilities tries to print something with the .color
|
175
|
+
method. Now Codesake::Dawn uses a new codesake-commons gem version that fixes
|
176
|
+
how rainbow gem deals with colorized output.
|
177
|
+
|
178
|
+
## Version 1.0.1 - codename: Lightning McQueen (2014-01-25)
|
179
|
+
|
180
|
+
* Fixing issue #22. PatternMatchingCheck evaluates lines starting with the '#'
|
181
|
+
when applying regular expresion to get the job done. Of course this can be an
|
182
|
+
issue when it finds offending patterns inside comments (and this is why using
|
183
|
+
pattern matching in a security code review is EVIL!). Now there is an
|
184
|
+
attribute, avoid\_comments that tells the class to eventually strip leading
|
185
|
+
whitespaces from string and not to apply regex if the line is starting with
|
186
|
+
'#'.
|
187
|
+
Again, applying pattern matching approach to security leads to a lot of false
|
188
|
+
positives and should be avoided when possible, even with low severity checks
|
189
|
+
like this.
|
190
|
+
* Fixing issue #21. RoR cheatsheet security checks now have a detailed message
|
191
|
+
telling what's wen wrong with the code and why the check fired.
|
192
|
+
|
193
|
+
## Version 1.0.0 - codename: Lightning McQueen (2014-01-21)
|
194
|
+
|
195
|
+
* Fixing issue #19 (https://github.com/codesake/codesake-dawn/issues/19). There
|
196
|
+
was a problem on ```is_a_vulnerable_version?``` routine that flags a security
|
197
|
+
check as vulnerable even if it wasn't. During the dependency check, if the
|
198
|
+
vulnerable gem and the dependency has both major and minor version equal and
|
199
|
+
the patch number tells if the gem is vulnerable or not, this check failed.
|
200
|
+
* ruby_version_check.rb: fixed an issue on is_vulnerable_patchlevel? that
|
201
|
+
caused a nil pointer exception when ruby interpreter patchlevel was evaluated
|
202
|
+
* ruby_version_check.rb: fixed an issue on is_vulnerable_patchlevel? that loads
|
203
|
+
the safe patchlevels comparing the wrong parameter.
|
204
|
+
* Added a rake task to better integrate codesake-dawn in a continous
|
205
|
+
development workflow. Now when you install codesake-dawn you have a 'rake
|
206
|
+
dawn' task executing the tool on the current directory.
|
207
|
+
* In BasicCheck::is_vulnerable_version? added support for the fourth version
|
208
|
+
number. We needed this to implement check for CVE-2013-7086
|
209
|
+
* Fixing issue #20. is_vulnerable_version? has a problem when the patchlevel is
|
210
|
+
the same but there are only three different version numbers (x.y.z format).
|
211
|
+
The last change introduces this vuln. Thank you Florin for opening the issue.
|
212
|
+
* Created a dedicated web site: [dawn.codesake.com](http://dawn.codesake.com)
|
213
|
+
* Fixing issue #8. The omniauth-oauth2 version 1.1.1 has a CSRF vulnerability
|
214
|
+
(CVE-2012-6134). The patch is already merged in the git repository but there
|
215
|
+
are no further gem releases. The suggested mitigation is to tell your Gemfile
|
216
|
+
to fetch the code directly from github rather then using rubygems.org
|
217
|
+
* Fixing issue #18. Owasp RoR Cheatsheet check was missing of message and
|
218
|
+
mitigation step.
|
219
|
+
* Fixing issue #17 with some more directories to be in whitelist in pattern
|
220
|
+
matching check. More exclusions will be added in further releases
|
221
|
+
* Added spec files for almost all security checks after 2008. Almost all kind
|
222
|
+
of checks (dependency, pattern matching, combo, ruby version) are covered by
|
223
|
+
a test.
|
224
|
+
* DependencyCheck assumes that if x.y.z version fixes an issue, every minor
|
225
|
+
version in the same major are affected as well. This assumption is risky, so
|
226
|
+
we introduced an attribute saying that the previous minor versions are
|
227
|
+
affected or not. This attribute is automagically set to true in dependencies
|
228
|
+
check when dealing with the rails gem. This assumption is not done for
|
229
|
+
previous major versions. Let's say a gem version 1.2.3 has a problem,
|
230
|
+
DependencyCheck doesn't say nothing about 0.9.3, but it thinks 1.1.9 is
|
231
|
+
vulnerable.
|
232
|
+
* Added a check for CVE-2004-0755
|
233
|
+
* Added a check for CVE-2004-0983
|
234
|
+
* Added a check for CVE-2005-1992
|
235
|
+
* Added a check for CVE-2005-2337
|
236
|
+
* Added a check for CVE-2006-1931
|
237
|
+
* Added a check for CVE-2006-2582
|
238
|
+
* Added a check for CVE-2006-3694
|
239
|
+
* Added a check for CVE-2006-4112
|
240
|
+
* Added a check for CVE-2006-5467
|
241
|
+
* Added a check for CVE-2006-6303
|
242
|
+
* Added a check for CVE-2006-6852
|
243
|
+
* Added a check for CVE-2006-6979
|
244
|
+
* Added a check for CVE-2007-0469
|
245
|
+
* Added a check for CVE-2007-5162
|
246
|
+
* Added a check for CVE-2007-5379
|
247
|
+
* Added a check for CVE-2007-5380
|
248
|
+
* Added a check for CVE-2007-5770
|
249
|
+
* Added a check for CVE-2007-6077
|
250
|
+
* Added a check for CVE-2007-6612
|
251
|
+
* Added a check for CVE-2008-1145
|
252
|
+
* Added a check for CVE-2008-1891
|
253
|
+
* Added a check for CVE-2008-2376
|
254
|
+
* Added a check for CVE-2008-2662
|
255
|
+
* Added a check for CVE-2008-2663
|
256
|
+
* Added a check for CVE-2008-2664
|
257
|
+
* Added a check for CVE-2008-2725
|
258
|
+
* Added a check for CVE-2008-3655
|
259
|
+
* Added a check for CVE-2008-3657
|
260
|
+
* Added a check for CVE-2008-3790
|
261
|
+
* Added a check for CVE-2008-3905
|
262
|
+
* Added a check for CVE-2008-4094
|
263
|
+
* Added a check for CVE-2008-4310
|
264
|
+
* Added a check for CVE-2008-5189
|
265
|
+
* Added a check for CVE-2008-7248
|
266
|
+
* Added a check for CVE-2009-4078
|
267
|
+
* Added a check for CVE-2009-4124
|
268
|
+
* Added a check for CVE-2009-4214
|
269
|
+
* Added a check for CVE-2010-2489
|
270
|
+
* Added a check for CVE-2010-3933
|
271
|
+
* Added a check for CVE-2011-0188
|
272
|
+
* Added a check for CVE-2011-0739
|
273
|
+
* Added a check for CVE-2011-1004
|
274
|
+
* Added a check for CVE-2011-1005
|
275
|
+
* Added a check for CVE-2011-2686
|
276
|
+
* Added a check for CVE-2011-2705
|
277
|
+
* Added a check for CVE-2011-2930
|
278
|
+
* Added a check for CVE-2011-3009
|
279
|
+
* Added a check for CVE-2011-3187
|
280
|
+
* Added a check for CVE-2011-4319
|
281
|
+
* Added a check for CVE-2012-1098
|
282
|
+
* Added a check for CVE-2012-2139
|
283
|
+
* Added a check for CVE-2012-2671
|
284
|
+
* Added a check for CVE-2013-0162
|
285
|
+
* Added a check for CVE-2013-0256
|
286
|
+
* Added a check for CVE-2013-0263
|
287
|
+
* Added a check for CVE-2013-1756
|
288
|
+
* Added a check for CVE-2013-2090
|
289
|
+
* Added a check for CVE-2013-2119
|
290
|
+
* Added a check for CVE-2013-5647
|
291
|
+
* Added a check for CVE-2013-6459
|
292
|
+
* Added a check for CVE-2013-7086
|
293
|
+
|
294
|
+
|
295
|
+
## Version 0.85 - codename: elevator (2013-12-17)
|
296
|
+
|
297
|
+
* refactoring bin/dawn script: some stuff were moved into Codesake::Core class
|
298
|
+
* Added a check against Denial of Service vulnerability for Nokogiri 1.5.x
|
299
|
+
and 1.6.0 when used with JRuby.
|
300
|
+
* Added a check against Denial of Service vulnerability due to entity expansion
|
301
|
+
for Nokogiri 1.5.x and 1.6.0 when used with JRuby.
|
302
|
+
* Added a check for CVE-2013-4478 (sup remote code execution)
|
303
|
+
* Added a check for CVE-2013-4479 (sup remote code execution)
|
304
|
+
* Added a check for CVE-2013-1812 (ruby-openid denial of service)
|
305
|
+
* Added a check for CVE-2013-6421 (sprout remote code execution)
|
306
|
+
|
307
|
+
|
308
|
+
## Version 0.80 - codename: elevator (2013-12-12)
|
309
|
+
|
310
|
+
* adding test for CVE-2013-4164
|
311
|
+
* adding test for CVE-2013-4457
|
312
|
+
* adding test for CVE-2013-4562
|
313
|
+
* added a '-z' flag to exit the process with the number of issues found as exit code
|
314
|
+
* added a Cross Site Scripting in Simple Form gem
|
315
|
+
* adding test for CVE-2013-4492
|
316
|
+
* adding test for CVE-2013-4491
|
317
|
+
* adding test for CVE-2013-6414
|
318
|
+
* adding test for CVE-2013-6415
|
319
|
+
* adding test for CVE-2013-6416
|
320
|
+
* adding test for CVE-2013-6417
|
321
|
+
|
322
|
+
|
323
|
+
## Version 0.79.99 - codename:oddity (2013-11-14)
|
324
|
+
|
325
|
+
This is the first codesake-dawn version making codesake.com web application
|
326
|
+
able to scan something. It deserves a special release.
|
327
|
+
|
328
|
+
* adding test for CVE-2013-2065
|
329
|
+
* adding test for CVE-2013-4389
|
330
|
+
* adding test for CVE-2010-1330
|
331
|
+
* adding test for CVE-2011-0446
|
332
|
+
* adding test for CVE-2011-0995
|
333
|
+
* adding test for CVE-2011-2929
|
334
|
+
* adding test for CVE-2011-4815
|
335
|
+
* adding test for CVE-2012-3424
|
336
|
+
* adding test for CVE-2012-5380
|
337
|
+
* adding test for CVE-2012-4522
|
338
|
+
* adding test for RoRCheatSheet\_1
|
339
|
+
* adding test for RoRCheatSheet\_4
|
340
|
+
* adding test for RoRCheatSheet\_7
|
341
|
+
* adding test for RoRCheatSheet\_8
|
342
|
+
* Fix issue #1. You can read more about it in TODO.md
|
343
|
+
* Added API to scan a single Gemfile.lock using -G flag
|
344
|
+
|
345
|
+
|
346
|
+
## Version 0.70 (2013-06-19)
|
347
|
+
|
348
|
+
* adding test for CVE-2011-0447
|
349
|
+
* adding test for CVE-2011-3186
|
350
|
+
* adding test for CVE-2012-1099
|
351
|
+
* adding test for CVE-2012-1241
|
352
|
+
* adding test for CVE-2012-2140
|
353
|
+
* adding test for CVE-2012-5370
|
354
|
+
* adding test for CVE-2012-5371
|
355
|
+
* adding test for CVE-2011-2197
|
356
|
+
* adding test for CVE-2011-2932
|
357
|
+
* adding test for CVE-2012-3463
|
358
|
+
* adding test for CVE-2012-3464
|
359
|
+
* adding test for CVE-2012-4464
|
360
|
+
* adding test for CVE-2012-4466
|
361
|
+
* adding test for CVE-2012-4481
|
362
|
+
* adding test for CVE-2012-6134
|
363
|
+
* Fix issue #4. PatternMatching complains when applied to binary files. We must
|
364
|
+
skip them
|
365
|
+
* add ruby\_parser dependency
|
366
|
+
* add haml dependency
|
367
|
+
* add target MVC autodetect
|
368
|
+
* write '--help'
|
369
|
+
* detect sinks for XSS in Sinatra applications
|
370
|
+
* detect reflected XSS in Sinatra applications
|
371
|
+
|
372
|
+
|
373
|
+
## Version 0.60 (2013-05-28)
|
374
|
+
|
375
|
+
* adding cucumber dependency
|
376
|
+
* adding test for CVE-2013-1854
|
377
|
+
* adding test for CVE-2013-1856
|
378
|
+
* adding test for CVE-2013-0276
|
379
|
+
* adding test for CVE-2013-0277
|
380
|
+
* adding test for CVE-2013-0156
|
381
|
+
* adding test for CVE-2013-2615
|
382
|
+
* adding test for CVE-2013-1875
|
383
|
+
* adding test for CVE-2013-1655
|
384
|
+
* adding test for CVE-2013-1656
|
385
|
+
* adding test for CVE-2013-0175
|
386
|
+
* adding test for CVE-2013-0233
|
387
|
+
* adding test for CVE-2013-0284
|
388
|
+
* adding test for CVE-2013-0285
|
389
|
+
* adding test for CVE-2013-1801
|
390
|
+
* adding test for CVE-2013-1802
|
391
|
+
* adding test for CVE-2013-1821
|
392
|
+
* adding test for CVE-2013-1898
|
393
|
+
* adding test for CVE-2013-1911
|
394
|
+
* adding test for CVE-2013-1933
|
395
|
+
* adding test for CVE-2013-1947
|
396
|
+
* adding test for CVE-2013-1948
|
397
|
+
* adding test for CVE-2013-2616
|
398
|
+
* adding test for CVE-2013-2617
|
399
|
+
* adding test for CVE-2013-3221
|
400
|
+
* make output less verbose. Only vulnerabilities and severity will be shown
|
401
|
+
* adding a '--verbose' option to see also the whole knowledge base info about each findings
|
402
|
+
* adding a '--output' option
|
403
|
+
* adding a '--count-only' option
|
404
|
+
* support JSON output
|
405
|
+
|
406
|
+
|
407
|
+
## Version 0.50 (2013-05-13) - First public release
|
408
|
+
|
409
|
+
* adding test for CVE\_2013\_0269
|
410
|
+
* adding test for CVE\_2013\_0155
|
411
|
+
* adding test for CVE\_2011\_2931
|
412
|
+
* adding test for CVE\_2012\_3465
|