dradis-nessus 4.8.0 → 4.9.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0c039e13d688f7d7548a486d3b1cf8c0fde79e93011237b350f82480beae2882
4
- data.tar.gz: d3662405266ace5114d0eec7f73404992253151c4635743d089e86268e95d07f
3
+ metadata.gz: d2b94d208af07d440292a97eb31ed3f8390531d1ac186493b5b9183d2bccdeec
4
+ data.tar.gz: 4d856d720edfcb536cf08a4c99ce5bcaf4e0f8a08e396dd01302ac415cb35e9b
5
5
  SHA512:
6
- metadata.gz: 1e2d9fb92296c187743ee3656fd0a5f2bad64041c149f1d1f4109fa1fe04d5b872fffde16298161cc96fc2f28f98d3a2962c3867efdf3882782f25d4a16581a4
7
- data.tar.gz: c5ad08f7f9495cc5697bf9c8a3517521be1b1329cbe392d614a99fa67f7868dadb209bb4b18aae35e0f42091acff0a3a227ce3505a90aee7c06faafd489972fd
6
+ metadata.gz: 74bab9688d4784b2fac1a9fc03c2410623090ff3647271bb3c4e9bd1ad1cf7bf611c0443b3049dc3661c735be96cdc108d60b7a4462723f507a32796cdae7762
7
+ data.tar.gz: 7e1f04a81085147b2e01f940aef1765c4bda5f7d11bdb7ae75a5cb648dbdf99d622036d748f77e9a429e58d5697daad953e48c53b14f64b211fcf0cbfcddf4be
data/CHANGELOG.md CHANGED
@@ -1,3 +1,7 @@
1
+ v4.9.0 (June 2023)
2
+ - Parse code tags as inline code
3
+ - Add plugin_type as an available Issue field
4
+
1
5
  v4.8.0 (April 2023)
2
6
  - No changes
3
7
 
@@ -8,7 +8,7 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 4
11
- MINOR = 8
11
+ MINOR = 9
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -27,8 +27,8 @@ module Nessus
27
27
  :exploit_code_maturity, :exploit_framework_canvas, :exploit_framework_core,
28
28
  :exploitability_ease, :exploit_framework_metasploit,:metasploit_name,
29
29
  :patch_publication_date, :plugin_modification_date, :plugin_output,
30
- :plugin_publication_date, :plugin_version, :product_coverage, :risk_factor,
31
- :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
30
+ :plugin_publication_date, :plugin_type, :plugin_version, :product_coverage,
31
+ :risk_factor, :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
32
32
  :threat_sources_last_28, :vpr_score, :vuln_publication_date,
33
33
  # multiple tags
34
34
  :bid_entries, :cve_entries, :see_also_entries, :xref_entries,
@@ -123,7 +123,7 @@ module Nessus
123
123
 
124
124
  def cleanup_html(source)
125
125
  result = source.dup
126
- result.gsub!(/<code>(.*?)<\/code>/) { "\n\nbc. #{$1}\n\np. \n" }
126
+ result.gsub!(/<code>(.*?)<\/code>/) { "@#{$1}@" }
127
127
  result
128
128
  end
129
129
 
@@ -25,6 +25,7 @@ report_item.plugin_modification_date
25
25
  report_item.plugin_name
26
26
  report_item.plugin_output
27
27
  report_item.plugin_publication_date
28
+ report_item.plugin_type
28
29
  report_item.plugin_version
29
30
  report_item.port
30
31
  report_item.product_coverage
@@ -23,6 +23,7 @@ If safe checks are enabled, this may be a false positive since it is based on th
23
23
  1.2.2 and above, 1.3 through 1.3.24, and 2.0 through 2.0.36 are affected, the remote server may be running a patched version of Apache.</description>
24
24
 
25
25
  <plugin_publication_date>2002/06/17</plugin_publication_date>
26
+ <plugin_type>remote</plugin_type>
26
27
  <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
27
28
  <cvss3_base_score>3.7</cvss3_base_score>
28
29
  <cvss3_temporal_score>6.8</cvss3_temporal_score>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 4.8.0
4
+ version: 4.9.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-04-12 00:00:00.000000000 Z
11
+ date: 2023-05-31 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins