dradis-nessus 4.7.0 → 4.9.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a3e1a48ec4d494ff441d2bdc36715921974e4a0a6829758c0d51cc38c0cdd855
4
- data.tar.gz: a372370e2ec2079c541476b9689a524abaa6d661d5782098943ad667264b4fc3
3
+ metadata.gz: d2b94d208af07d440292a97eb31ed3f8390531d1ac186493b5b9183d2bccdeec
4
+ data.tar.gz: 4d856d720edfcb536cf08a4c99ce5bcaf4e0f8a08e396dd01302ac415cb35e9b
5
5
  SHA512:
6
- metadata.gz: 7ca605cb4e8f5893e757cc7c3a86fcaadc12f75b4621d37537ec90fb2cc5f2a1bc3ae7d69cb19a8dbf219d90ac38a9b0fbc1b2dad709f2eda5708a871f3da87b
7
- data.tar.gz: b990aba89cf10d2d732db508a318cd17d1b5071d220ffe491471c5ab6a9250d272a167e6ce3c181c4505735ae31757be22dbdf414e858a30f342581605b40d06
6
+ metadata.gz: 74bab9688d4784b2fac1a9fc03c2410623090ff3647271bb3c4e9bd1ad1cf7bf611c0443b3049dc3661c735be96cdc108d60b7a4462723f507a32796cdae7762
7
+ data.tar.gz: 7e1f04a81085147b2e01f940aef1765c4bda5f7d11bdb7ae75a5cb648dbdf99d622036d748f77e9a429e58d5697daad953e48c53b14f64b211fcf0cbfcddf4be
data/CHANGELOG.md CHANGED
@@ -1,3 +1,10 @@
1
+ v4.9.0 (June 2023)
2
+ - Parse code tags as inline code
3
+ - Add plugin_type as an available Issue field
4
+
5
+ v4.8.0 (April 2023)
6
+ - No changes
7
+
1
8
  v4.7.0 (February 2023)
2
9
  - Clean up code tags in description fields
3
10
 
@@ -8,7 +8,7 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 4
11
- MINOR = 7
11
+ MINOR = 9
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -27,8 +27,8 @@ module Nessus
27
27
  :exploit_code_maturity, :exploit_framework_canvas, :exploit_framework_core,
28
28
  :exploitability_ease, :exploit_framework_metasploit,:metasploit_name,
29
29
  :patch_publication_date, :plugin_modification_date, :plugin_output,
30
- :plugin_publication_date, :plugin_version, :product_coverage, :risk_factor,
31
- :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
30
+ :plugin_publication_date, :plugin_type, :plugin_version, :product_coverage,
31
+ :risk_factor, :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
32
32
  :threat_sources_last_28, :vpr_score, :vuln_publication_date,
33
33
  # multiple tags
34
34
  :bid_entries, :cve_entries, :see_also_entries, :xref_entries,
@@ -123,7 +123,7 @@ module Nessus
123
123
 
124
124
  def cleanup_html(source)
125
125
  result = source.dup
126
- result.gsub!(/<code>(.*?)<\/code>/) { "\n\nbc. #{$1}\n\np. \n" }
126
+ result.gsub!(/<code>(.*?)<\/code>/) { "@#{$1}@" }
127
127
  result
128
128
  end
129
129
 
@@ -25,6 +25,7 @@ report_item.plugin_modification_date
25
25
  report_item.plugin_name
26
26
  report_item.plugin_output
27
27
  report_item.plugin_publication_date
28
+ report_item.plugin_type
28
29
  report_item.plugin_version
29
30
  report_item.port
30
31
  report_item.product_coverage
@@ -23,6 +23,7 @@ If safe checks are enabled, this may be a false positive since it is based on th
23
23
  1.2.2 and above, 1.3 through 1.3.24, and 2.0 through 2.0.36 are affected, the remote server may be running a patched version of Apache.</description>
24
24
 
25
25
  <plugin_publication_date>2002/06/17</plugin_publication_date>
26
+ <plugin_type>remote</plugin_type>
26
27
  <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
27
28
  <cvss3_base_score>3.7</cvss3_base_score>
28
29
  <cvss3_temporal_score>6.8</cvss3_temporal_score>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 4.7.0
4
+ version: 4.9.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-02-20 00:00:00.000000000 Z
11
+ date: 2023-05-31 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins