dradis-nessus 4.8.0 → 4.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0c039e13d688f7d7548a486d3b1cf8c0fde79e93011237b350f82480beae2882
4
- data.tar.gz: d3662405266ace5114d0eec7f73404992253151c4635743d089e86268e95d07f
3
+ metadata.gz: d2b94d208af07d440292a97eb31ed3f8390531d1ac186493b5b9183d2bccdeec
4
+ data.tar.gz: 4d856d720edfcb536cf08a4c99ce5bcaf4e0f8a08e396dd01302ac415cb35e9b
5
5
  SHA512:
6
- metadata.gz: 1e2d9fb92296c187743ee3656fd0a5f2bad64041c149f1d1f4109fa1fe04d5b872fffde16298161cc96fc2f28f98d3a2962c3867efdf3882782f25d4a16581a4
7
- data.tar.gz: c5ad08f7f9495cc5697bf9c8a3517521be1b1329cbe392d614a99fa67f7868dadb209bb4b18aae35e0f42091acff0a3a227ce3505a90aee7c06faafd489972fd
6
+ metadata.gz: 74bab9688d4784b2fac1a9fc03c2410623090ff3647271bb3c4e9bd1ad1cf7bf611c0443b3049dc3661c735be96cdc108d60b7a4462723f507a32796cdae7762
7
+ data.tar.gz: 7e1f04a81085147b2e01f940aef1765c4bda5f7d11bdb7ae75a5cb648dbdf99d622036d748f77e9a429e58d5697daad953e48c53b14f64b211fcf0cbfcddf4be
data/CHANGELOG.md CHANGED
@@ -1,3 +1,7 @@
1
+ v4.9.0 (June 2023)
2
+ - Parse code tags as inline code
3
+ - Add plugin_type as an available Issue field
4
+
1
5
  v4.8.0 (April 2023)
2
6
  - No changes
3
7
 
@@ -8,7 +8,7 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 4
11
- MINOR = 8
11
+ MINOR = 9
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -27,8 +27,8 @@ module Nessus
27
27
  :exploit_code_maturity, :exploit_framework_canvas, :exploit_framework_core,
28
28
  :exploitability_ease, :exploit_framework_metasploit,:metasploit_name,
29
29
  :patch_publication_date, :plugin_modification_date, :plugin_output,
30
- :plugin_publication_date, :plugin_version, :product_coverage, :risk_factor,
31
- :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
30
+ :plugin_publication_date, :plugin_type, :plugin_version, :product_coverage,
31
+ :risk_factor, :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
32
32
  :threat_sources_last_28, :vpr_score, :vuln_publication_date,
33
33
  # multiple tags
34
34
  :bid_entries, :cve_entries, :see_also_entries, :xref_entries,
@@ -123,7 +123,7 @@ module Nessus
123
123
 
124
124
  def cleanup_html(source)
125
125
  result = source.dup
126
- result.gsub!(/<code>(.*?)<\/code>/) { "\n\nbc. #{$1}\n\np. \n" }
126
+ result.gsub!(/<code>(.*?)<\/code>/) { "@#{$1}@" }
127
127
  result
128
128
  end
129
129
 
@@ -25,6 +25,7 @@ report_item.plugin_modification_date
25
25
  report_item.plugin_name
26
26
  report_item.plugin_output
27
27
  report_item.plugin_publication_date
28
+ report_item.plugin_type
28
29
  report_item.plugin_version
29
30
  report_item.port
30
31
  report_item.product_coverage
@@ -23,6 +23,7 @@ If safe checks are enabled, this may be a false positive since it is based on th
23
23
  1.2.2 and above, 1.3 through 1.3.24, and 2.0 through 2.0.36 are affected, the remote server may be running a patched version of Apache.</description>
24
24
 
25
25
  <plugin_publication_date>2002/06/17</plugin_publication_date>
26
+ <plugin_type>remote</plugin_type>
26
27
  <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
27
28
  <cvss3_base_score>3.7</cvss3_base_score>
28
29
  <cvss3_temporal_score>6.8</cvss3_temporal_score>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 4.8.0
4
+ version: 4.9.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-04-12 00:00:00.000000000 Z
11
+ date: 2023-05-31 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins