dradis-nessus 3.7.0 → 3.8.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: a14b2a69eab17116cc157efa4f8d1b295f5635c6
4
- data.tar.gz: e5bfed8770eed64b75b5800ba518762c9ae1820e
3
+ metadata.gz: 6848358a38d973814a0969c145bc8f0b984deb6f
4
+ data.tar.gz: 1efdf8f1ecb26f4350282c8f10ab41b01e22d30d
5
5
  SHA512:
6
- metadata.gz: 423de525cac3910168f9423db7da9a28ef9bdd7a20192f179728bc1a58e0c265b79aa5feffaae799761af470a19f2cf191bd96022999fab97f05f631f4461fd6
7
- data.tar.gz: c5e29c4c84d65f5995db98ce4f4f6c7105b7466ac5ecd2493867b9ca6309108276271ab56a72bb894d0eb5881fdcec882aefbd667bc161fce259b4b57da499ff
6
+ metadata.gz: 4be6eb1aa00202aac9b371857fb7c9dc1fd7415d7b542ed9712618233ff1619006c5610a2d34c50c68aeb0747dba4ab19708beac7b39d9e704dbe7317c662a5e
7
+ data.tar.gz: 0dd2cd17b8c64ea70462e7d7a238a877ad00753b3c8436c2c6d05017da60e9fbe8c64d049604036c1c0af2145ef13fea294a9ddd07bc62d71b90d73f69786df1
data/CHANGELOG.md CHANGED
@@ -1,8 +1,11 @@
1
+ ## Dradis Framework 3.8 (September, 2017) ##
2
+
3
+ * Added CVSSv3 fields.
4
+
1
5
  ## Dradis Framework 3.7 (July, 2017) ##
2
6
 
3
7
  * No changes.
4
8
 
5
-
6
9
  ## Dradis Framework 3.6 (March, 2017) ##
7
10
 
8
11
  * No changes.
@@ -8,7 +8,7 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 3
11
- MINOR = 7
11
+ MINOR = 8
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -22,9 +22,9 @@ module Nessus
22
22
  :port, :svc_name, :protocol, :severity, :plugin_id, :plugin_name, :plugin_family,
23
23
  # simple tags
24
24
  :solution, :risk_factor, :description, :plugin_publication_date,
25
- :metasploit_name, :cvss_vector, :cvss_temporal_vector, :synopsis,
25
+ :metasploit_name, :cvss_vector, :cvss3_vector, :cvss_temporal_vector, :synopsis,
26
26
  :exploit_available, :patch_publication_date, :plugin_modification_date,
27
- :cvss_temporal_score, :cvss_base_score, :plugin_output,
27
+ :cvss_temporal_score, :cvss_base_score, :cvss3_base_score, :plugin_output,
28
28
  :plugin_version, :exploitability_ease, :vuln_publication_date,
29
29
  :exploit_framework_canvas, :exploit_framework_metasploit,
30
30
  :exploit_framework_core,
@@ -16,9 +16,11 @@ report_item.description
16
16
  report_item.plugin_publication_date
17
17
  report_item.metasploit_name
18
18
  report_item.cvss_vector
19
+ report_item.cvss3_vector
19
20
  report_item.cvss_temporal_vector
20
21
  report_item.cvss_temporal_score
21
22
  report_item.cvss_base_score
23
+ report_item.cvss3_base_score
22
24
  report_item.synopsis
23
25
  report_item.exploit_available
24
26
  report_item.patch_publication_date
@@ -23,6 +23,8 @@ If safe checks are enabled, this may be a false positive since it is based on th
23
23
 
24
24
  <plugin_publication_date>2002/06/17</plugin_publication_date>
25
25
  <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
26
+ <cvss3_base_score>3.7</cvss3_base_score>
27
+ <cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
26
28
  <cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
27
29
  <synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
28
30
  <plugin_type>remote</plugin_type>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.7.0
4
+ version: 3.8.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-07-26 00:00:00.000000000 Z
11
+ date: 2017-09-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins