dradis-nessus 3.7.0 → 3.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: a14b2a69eab17116cc157efa4f8d1b295f5635c6
4
- data.tar.gz: e5bfed8770eed64b75b5800ba518762c9ae1820e
3
+ metadata.gz: 6848358a38d973814a0969c145bc8f0b984deb6f
4
+ data.tar.gz: 1efdf8f1ecb26f4350282c8f10ab41b01e22d30d
5
5
  SHA512:
6
- metadata.gz: 423de525cac3910168f9423db7da9a28ef9bdd7a20192f179728bc1a58e0c265b79aa5feffaae799761af470a19f2cf191bd96022999fab97f05f631f4461fd6
7
- data.tar.gz: c5e29c4c84d65f5995db98ce4f4f6c7105b7466ac5ecd2493867b9ca6309108276271ab56a72bb894d0eb5881fdcec882aefbd667bc161fce259b4b57da499ff
6
+ metadata.gz: 4be6eb1aa00202aac9b371857fb7c9dc1fd7415d7b542ed9712618233ff1619006c5610a2d34c50c68aeb0747dba4ab19708beac7b39d9e704dbe7317c662a5e
7
+ data.tar.gz: 0dd2cd17b8c64ea70462e7d7a238a877ad00753b3c8436c2c6d05017da60e9fbe8c64d049604036c1c0af2145ef13fea294a9ddd07bc62d71b90d73f69786df1
data/CHANGELOG.md CHANGED
@@ -1,8 +1,11 @@
1
+ ## Dradis Framework 3.8 (September, 2017) ##
2
+
3
+ * Added CVSSv3 fields.
4
+
1
5
  ## Dradis Framework 3.7 (July, 2017) ##
2
6
 
3
7
  * No changes.
4
8
 
5
-
6
9
  ## Dradis Framework 3.6 (March, 2017) ##
7
10
 
8
11
  * No changes.
@@ -8,7 +8,7 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 3
11
- MINOR = 7
11
+ MINOR = 8
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -22,9 +22,9 @@ module Nessus
22
22
  :port, :svc_name, :protocol, :severity, :plugin_id, :plugin_name, :plugin_family,
23
23
  # simple tags
24
24
  :solution, :risk_factor, :description, :plugin_publication_date,
25
- :metasploit_name, :cvss_vector, :cvss_temporal_vector, :synopsis,
25
+ :metasploit_name, :cvss_vector, :cvss3_vector, :cvss_temporal_vector, :synopsis,
26
26
  :exploit_available, :patch_publication_date, :plugin_modification_date,
27
- :cvss_temporal_score, :cvss_base_score, :plugin_output,
27
+ :cvss_temporal_score, :cvss_base_score, :cvss3_base_score, :plugin_output,
28
28
  :plugin_version, :exploitability_ease, :vuln_publication_date,
29
29
  :exploit_framework_canvas, :exploit_framework_metasploit,
30
30
  :exploit_framework_core,
@@ -16,9 +16,11 @@ report_item.description
16
16
  report_item.plugin_publication_date
17
17
  report_item.metasploit_name
18
18
  report_item.cvss_vector
19
+ report_item.cvss3_vector
19
20
  report_item.cvss_temporal_vector
20
21
  report_item.cvss_temporal_score
21
22
  report_item.cvss_base_score
23
+ report_item.cvss3_base_score
22
24
  report_item.synopsis
23
25
  report_item.exploit_available
24
26
  report_item.patch_publication_date
@@ -23,6 +23,8 @@ If safe checks are enabled, this may be a false positive since it is based on th
23
23
 
24
24
  <plugin_publication_date>2002/06/17</plugin_publication_date>
25
25
  <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
26
+ <cvss3_base_score>3.7</cvss3_base_score>
27
+ <cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
26
28
  <cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
27
29
  <synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
28
30
  <plugin_type>remote</plugin_type>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.7.0
4
+ version: 3.8.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-07-26 00:00:00.000000000 Z
11
+ date: 2017-09-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins