risu 1.8.3 → 1.8.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -5
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/Gemfile.lock +159 -0
- data/LICENSE +1 -1
- data/README.markdown +2 -5
- data/Rakefile +1 -1
- data/bin/risu +1 -1
- data/docs/NEWS.markdown +3 -0
- data/lib/risu.rb +2 -2
- data/lib/risu/base.rb +1 -1
- data/lib/risu/base/graph_template_helper.rb +1 -1
- data/lib/risu/base/host_template_helper.rb +2 -1
- data/lib/risu/base/malware_template_helper.rb +1 -1
- data/lib/risu/base/post_process_base.rb +7 -4
- data/lib/risu/base/post_process_manager.rb +1 -1
- data/lib/risu/base/scan_helper.rb +1 -1
- data/lib/risu/base/schema.rb +10 -3
- data/lib/risu/base/shares_template_helper.rb +1 -1
- data/lib/risu/base/template_base.rb +1 -1
- data/lib/risu/base/template_helper.rb +1 -1
- data/lib/risu/base/template_manager.rb +1 -1
- data/lib/risu/base/templater.rb +1 -1
- data/lib/risu/cli.rb +1 -1
- data/lib/risu/cli/application.rb +16 -16
- data/lib/risu/cli/banner.rb +1 -1
- data/lib/risu/exceptions.rb +1 -1
- data/lib/risu/exceptions/invaliddocument.rb +1 -1
- data/lib/risu/graphs.rb +1 -1
- data/lib/risu/graphs/top_vuln_graph.rb +1 -1
- data/lib/risu/graphs/windows_os_graph.rb +1 -1
- data/lib/risu/models.rb +2 -1
- data/lib/risu/models/attachment.rb +1 -1
- data/lib/risu/models/familyselection.rb +1 -1
- data/lib/risu/models/host.rb +34 -2
- data/lib/risu/models/hostproperty.rb +1 -1
- data/lib/risu/models/individualpluginselection.rb +1 -1
- data/lib/risu/models/item.rb +248 -20
- data/lib/risu/models/nessuspluginmetadata.rb +28 -0
- data/lib/risu/models/patch.rb +1 -1
- data/lib/risu/models/plugin.rb +1 -1
- data/lib/risu/models/pluginspreference.rb +1 -1
- data/lib/risu/models/policy.rb +1 -1
- data/lib/risu/models/reference.rb +1 -1
- data/lib/risu/models/report.rb +1 -1
- data/lib/risu/models/serverpreference.rb +1 -1
- data/lib/risu/models/servicedescription.rb +1 -1
- data/lib/risu/models/version.rb +1 -1
- data/lib/risu/parsers.rb +1 -1
- data/lib/risu/parsers/nessus/nessus_document.rb +1 -1
- data/lib/risu/parsers/nessus/nessus_sax_listener.rb +3 -2
- data/lib/risu/parsers/nessus/postprocess.rb +1 -1
- data/lib/risu/parsers/nessus/postprocess/7zip.rb +6 -4
- data/lib/risu/parsers/nessus/postprocess/adobe_acrobat.rb +48 -54
- data/lib/risu/parsers/nessus/postprocess/adobe_air.rb +58 -63
- data/lib/risu/parsers/nessus/postprocess/adobe_coldfusion.rb +47 -0
- data/lib/risu/parsers/nessus/postprocess/{shockwave.rb → adobe_creative_desktop.rb} +9 -34
- data/lib/risu/parsers/nessus/postprocess/adobe_flash_player.rb +175 -0
- data/lib/risu/parsers/nessus/postprocess/adobe_reader.rb +73 -55
- data/lib/risu/parsers/nessus/postprocess/adobe_shockwave_player.rb +74 -0
- data/lib/risu/parsers/nessus/postprocess/apache.rb +38 -33
- data/lib/risu/parsers/nessus/postprocess/apache_tomcat.rb +8 -10
- data/lib/risu/parsers/nessus/postprocess/apple_icloud.rb +47 -0
- data/lib/risu/parsers/nessus/postprocess/apple_itunes.rb +23 -17
- data/lib/risu/parsers/nessus/postprocess/apple_quicktime.rb +38 -32
- data/lib/risu/parsers/nessus/postprocess/artifex_ghostscript.rb +49 -0
- data/lib/risu/parsers/nessus/postprocess/blackberry_enterprise_server.rb +10 -14
- data/lib/risu/parsers/nessus/postprocess/ca_brightstor_arcserve.rb +10 -10
- data/lib/risu/parsers/nessus/postprocess/cisco_anyconnect.rb +18 -20
- data/lib/risu/parsers/nessus/postprocess/cisco_ios.rb +25 -15
- data/lib/risu/parsers/nessus/postprocess/cisco_telepresence.rb +45 -0
- data/lib/risu/parsers/nessus/postprocess/core_ftp.rb +6 -6
- data/lib/risu/parsers/nessus/postprocess/db2.rb +7 -9
- data/lib/risu/parsers/nessus/postprocess/dell_idrac.rb +49 -0
- data/lib/risu/parsers/nessus/postprocess/downgrade_plugins.rb +4 -2
- data/lib/risu/parsers/nessus/postprocess/dropbear_ssh.rb +7 -6
- data/lib/risu/parsers/nessus/postprocess/filezilla.rb +4 -6
- data/lib/risu/parsers/nessus/postprocess/firefox.rb +113 -71
- data/lib/risu/parsers/nessus/postprocess/flexnet.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/foxit_phantom_pdf.rb +10 -3
- data/lib/risu/parsers/nessus/postprocess/foxit_reader.rb +13 -12
- data/lib/risu/parsers/nessus/postprocess/google_chrome.rb +34 -6
- data/lib/risu/parsers/nessus/postprocess/hp_system_mgt_homepage.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/iLo.rb +50 -0
- data/lib/risu/parsers/nessus/postprocess/intel_mgt_engine.rb +47 -0
- data/lib/risu/parsers/nessus/postprocess/irfanview.rb +2 -2
- data/lib/risu/parsers/nessus/postprocess/java.rb +70 -64
- data/lib/risu/parsers/nessus/postprocess/libreoffice.rb +2 -2
- data/lib/risu/parsers/nessus/postprocess/microsoft_office.rb +73 -0
- data/lib/risu/parsers/nessus/postprocess/microsoft_visual_studio.rb +47 -0
- data/lib/risu/parsers/nessus/postprocess/microsoft_windows.rb +1312 -0
- data/lib/risu/parsers/nessus/postprocess/mongo_db.rb +46 -0
- data/lib/risu/parsers/nessus/postprocess/mozzila_thunderbird.rb +49 -0
- data/lib/risu/parsers/nessus/postprocess/normalize_plugin_names.rb +5 -2
- data/lib/risu/parsers/nessus/postprocess/openoffice.rb +14 -11
- data/lib/risu/parsers/nessus/postprocess/openssh.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/openssl.rb +58 -39
- data/lib/risu/parsers/nessus/postprocess/oracle_database.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/php.rb +94 -69
- data/lib/risu/parsers/nessus/postprocess/post_process.rb +1 -1
- data/lib/risu/parsers/nessus/postprocess/putty.rb +47 -0
- data/lib/risu/parsers/nessus/postprocess/real_player.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/risk_score.rb +1 -1
- data/lib/risu/parsers/nessus/postprocess/root_cause.rb +16 -3
- data/lib/risu/parsers/nessus/postprocess/samba.rb +46 -0
- data/lib/risu/parsers/nessus/postprocess/servu.rb +4 -4
- data/lib/risu/parsers/nessus/postprocess/sigplus_pro.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/skype.rb +4 -3
- data/lib/risu/parsers/nessus/postprocess/solarwinds_dameware.rb +48 -0
- data/lib/risu/parsers/nessus/postprocess/symantec_endpoint.rb +4 -3
- data/lib/risu/parsers/nessus/postprocess/symantec_pcanywhere.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/tenable_nessus.rb +47 -0
- data/lib/risu/parsers/nessus/postprocess/timbuktu.rb +2 -2
- data/lib/risu/parsers/nessus/postprocess/vlc.rb +4 -3
- data/lib/risu/parsers/nessus/postprocess/vmware_esxi.rb +64 -54
- data/lib/risu/parsers/nessus/postprocess/vmware_player.rb +3 -3
- data/lib/risu/parsers/nessus/postprocess/vmware_vcenter.rb +11 -5
- data/lib/risu/parsers/nessus/postprocess/vmware_vsphere_client.rb +7 -6
- data/lib/risu/parsers/nessus/postprocess/winscp.rb +7 -8
- data/lib/risu/parsers/nessus/postprocess/wireshark.rb +73 -51
- data/lib/risu/parsers/nexpose/nexpose_document.rb +1 -1
- data/lib/risu/parsers/nexpose/simple_nexpose.rb +1 -1
- data/lib/risu/renderers.rb +1 -1
- data/lib/risu/renderers/csvrenderer.rb +1 -1
- data/lib/risu/renderers/nilrenderer.rb +1 -1
- data/lib/risu/renderers/pdfrenderer.rb +1 -1
- data/lib/risu/template_helpers.rb +1 -1
- data/lib/risu/templates/assets.rb +1 -1
- data/lib/risu/templates/authentication_summary.rb +1 -1
- data/lib/risu/templates/cover_sheet.rb +1 -1
- data/lib/risu/templates/exec_summary.rb +1 -1
- data/lib/risu/templates/executive_summary_detailed.rb +1 -1
- data/lib/risu/templates/exploitablity_summary.rb +1 -1
- data/lib/risu/templates/failed_audits.rb +1 -1
- data/lib/risu/templates/finding_statistics.rb +1 -1
- data/lib/risu/templates/findings_host.rb +1 -1
- data/lib/risu/templates/findings_summary.rb +1 -1
- data/lib/risu/templates/findings_summary_with_pluginid.rb +1 -1
- data/lib/risu/templates/graphs.rb +1 -1
- data/lib/risu/templates/host_findings_csv.rb +1 -1
- data/lib/risu/templates/host_summary.rb +1 -1
- data/lib/risu/templates/malicious_process_detection.rb +1 -1
- data/lib/risu/templates/missing_root_causes.rb +1 -1
- data/lib/risu/templates/ms_patch_summary.rb +1 -1
- data/lib/risu/templates/ms_update_summary.rb +1 -1
- data/lib/risu/templates/ms_wsus_findings.rb +1 -1
- data/lib/risu/templates/notable.rb +1 -1
- data/lib/risu/templates/notable_detailed.rb +1 -1
- data/lib/risu/templates/pci_compliance.rb +1 -1
- data/lib/risu/templates/rollup_summary.rb +82 -0
- data/lib/risu/templates/stig_findings_summary.rb +1 -1
- data/lib/risu/templates/talking_points.rb +1 -1
- data/lib/risu/templates/technical_findings.rb +1 -1
- data/lib/risu/templates/template.rb +1 -1
- data/lib/risu/templates/top_25.rb +1 -1
- data/lib/risu/version.rb +2 -2
- data/risu.gemspec +5 -5
- metadata +59 -56
- metadata.gz.sig +0 -0
- data/lib/risu/parsers/nessus/postprocess/flash_player.rb +0 -145
- data/lib/risu/parsers/nessus/postprocess/windows.rb +0 -976
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -31,22 +31,32 @@ module Risu
|
|
|
31
31
|
{
|
|
32
32
|
:description => "Cisco IOS Patch Rollup",
|
|
33
33
|
:plugin_id => -99965,
|
|
34
|
-
:plugin_name => "
|
|
34
|
+
:plugin_name => "Missing the latest Cisco IOS Patches",
|
|
35
35
|
:item_name => "Update to the latest Cisco IOS",
|
|
36
36
|
:plugin_ids => [
|
|
37
|
-
58568,
|
|
38
|
-
58570,
|
|
39
|
-
58572,
|
|
40
|
-
62372,
|
|
41
|
-
62373,
|
|
42
|
-
65891,
|
|
43
|
-
70316,
|
|
44
|
-
70322,
|
|
45
|
-
73345,
|
|
46
|
-
78035,
|
|
47
|
-
82571,
|
|
48
|
-
|
|
49
|
-
|
|
37
|
+
58568, #Cisco IOS Software Multicast Source Discovery Protocol DoS (cisco-sa-20120328-msdp)
|
|
38
|
+
58570, #Cisco IOS Software Command Security Bypass (cisco-sa-20120328-pai)
|
|
39
|
+
58572, #Cisco IOS Software Smart Install Denial of Service Vulnerability (cisco-sa-20120328-smartinstall)
|
|
40
|
+
62372, #Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20120926-dhcp)
|
|
41
|
+
62373, #Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
|
|
42
|
+
65891, #Cisco IOS Software Smart Install Denial of Service Vulnerability (cisco-sa-20130327-smartinstall)
|
|
43
|
+
70316, #Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
|
|
44
|
+
70322, #Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
|
|
45
|
+
73345, #Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
|
|
46
|
+
78035, #Cisco IOS Software RSVP DoS (cisco-sa-20140924-rsvp)
|
|
47
|
+
82571, #Cisco IOS Software TCP CIP DoS
|
|
48
|
+
90358, #Cisco IOS Smart Install Packet Image List Parameter Handling DoS (cisco-sa-20160323-smi) 94252, #Cisco IOS Software CIP Request DoS (cisco-sa-20160928-cip)
|
|
49
|
+
99028, #Cisco IOS L2TP Parsing DoS (cisco-sa-20170322-l2tp)
|
|
50
|
+
99687, #Cisco IOS EnergyWise DoS (cisco-sa-20170419-energywise)
|
|
51
|
+
103670, #Cisco IOS Software PROFINET denial of service (cisco-sa-20170927-profinet)
|
|
52
|
+
97991, #Cisco IOS Cluster Management Protocol Telnet Option Handling RCE (cisco-sa-20170317-cmp)
|
|
53
|
+
94252, #Cisco IOS Software CIP Request DoS (cisco-sa-20160928-cip)
|
|
54
|
+
103565, #Cisco IOS Software DHCP Remote Code Execution Vulnerability
|
|
55
|
+
108722, #Cisco IOS Software Smart Install Remote Code Execution Vulnerability
|
|
56
|
+
108880, #Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328- lldp)
|
|
57
|
+
108956, #Cisco IOS Software DNS Forwarder Denial of Service Vulnerability (cisco-sa-20160928-dns)
|
|
58
|
+
109087, #Cisco IOS DHCP Multiple Vulnerabilities
|
|
59
|
+
117944, #Cisco IOS Software Cluster Management Protocol DoS Vulnerability (cisco-sa-20180926-cmp)
|
|
50
60
|
]
|
|
51
61
|
}
|
|
52
62
|
end
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
|
+
#
|
|
3
|
+
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
|
+
# of this software and associated documentation files (the "Software"), to deal
|
|
5
|
+
# in the Software without restriction, including without limitation the rights
|
|
6
|
+
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
7
|
+
# copies of the Software, and to permit persons to whom the Software is
|
|
8
|
+
# furnished to do so, subject to the following conditions:
|
|
9
|
+
#
|
|
10
|
+
# The above copyright notice and this permission notice shall be included in
|
|
11
|
+
# all copies or substantial portions of the Software.
|
|
12
|
+
#
|
|
13
|
+
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
14
|
+
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
15
|
+
# FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL THE
|
|
16
|
+
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
17
|
+
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
18
|
+
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
19
|
+
# THE SOFTWARE.
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
module Risu
|
|
23
|
+
module Parsers
|
|
24
|
+
module Nessus
|
|
25
|
+
module PostProcess
|
|
26
|
+
class CiscoTelepresenceRollup < Risu::Base::PostProcessBase
|
|
27
|
+
|
|
28
|
+
#
|
|
29
|
+
def initialize
|
|
30
|
+
@info =
|
|
31
|
+
{
|
|
32
|
+
:description => "Cisco Telepresence Patch Rollup",
|
|
33
|
+
:plugin_id => -99941,
|
|
34
|
+
:plugin_name => "Missing the latest Cisco Telepresence",
|
|
35
|
+
:item_name => "Update to the latest Cisco Telepresence",
|
|
36
|
+
:plugin_ids => [
|
|
37
|
+
100838, #Cisco TelePresence Endpoint SIP INVITE Packet Flood DoS (cisco-sa-20170607-tele)
|
|
38
|
+
]
|
|
39
|
+
}
|
|
40
|
+
end
|
|
41
|
+
end
|
|
42
|
+
end
|
|
43
|
+
end
|
|
44
|
+
end
|
|
45
|
+
end
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -31,13 +31,13 @@ module Risu
|
|
|
31
31
|
{
|
|
32
32
|
:description => "CoreFTP Patch Rollup",
|
|
33
33
|
:plugin_id => -99989,
|
|
34
|
-
:plugin_name => "
|
|
34
|
+
:plugin_name => "Missing the latest CoreFTP Patches",
|
|
35
35
|
:item_name => "Update to the latest CoreFTP",
|
|
36
36
|
:plugin_ids => [
|
|
37
|
-
65789,
|
|
38
|
-
70656,
|
|
39
|
-
59243
|
|
40
|
-
]
|
|
37
|
+
65789, #Core FTP < 2.2 build 1769 Multiple Buffer Overflows
|
|
38
|
+
70656, #Core FTP < 2.2 build 1785 CWD Command Buffer Overflow
|
|
39
|
+
59243, #Core FTP Filename Processing Boundary Error FTP List Command Response Parsing Remote Overflow
|
|
40
|
+
]
|
|
41
41
|
}
|
|
42
42
|
end
|
|
43
43
|
end
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -31,16 +31,14 @@ module Risu
|
|
|
31
31
|
{
|
|
32
32
|
:description => "DB2 Patch Rollup",
|
|
33
33
|
:plugin_id => -99980,
|
|
34
|
-
:plugin_name => "
|
|
34
|
+
:plugin_name => "Missing the latest DB2 Patches",
|
|
35
35
|
:item_name => "Update to the latest DB2",
|
|
36
36
|
:plugin_ids => [
|
|
37
|
-
62701,
|
|
38
|
-
71519,
|
|
39
|
-
76114,
|
|
40
|
-
76116,
|
|
41
|
-
84828
|
|
42
|
-
|
|
43
|
-
|
|
37
|
+
62701, #IBM DB2 9.7 < Fix Pack 7 Multiple Vulnerabilities
|
|
38
|
+
71519, #IBM DB2 9.7 < Fix Pack 9 Multiple Vulnerabilities
|
|
39
|
+
76114, #IBM DB2 9.7 < Fix Pack 9a Multiple Vulnerabilities
|
|
40
|
+
76116, #IBM DB2 Stored Procedure Infrastructure Privilege Escalation Vulnerability
|
|
41
|
+
84828, #IBM DB2 9.7 < Fix Pack 11 Multiple Vulnerabilities (Bar Mitzvah) (FREAK) (TLS POODLE)
|
|
44
42
|
]
|
|
45
43
|
}
|
|
46
44
|
end
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
|
+
#
|
|
3
|
+
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
|
+
# of this software and associated documentation files (the "Software"), to deal
|
|
5
|
+
# in the Software without restriction, including without limitation the rights
|
|
6
|
+
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
7
|
+
# copies of the Software, and to permit persons to whom the Software is
|
|
8
|
+
# furnished to do so, subject to the following conditions:
|
|
9
|
+
#
|
|
10
|
+
# The above copyright notice and this permission notice shall be included in
|
|
11
|
+
# all copies or substantial portions of the Software.
|
|
12
|
+
#
|
|
13
|
+
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
14
|
+
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
15
|
+
# FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL THE
|
|
16
|
+
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
17
|
+
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
18
|
+
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
19
|
+
# THE SOFTWARE.
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
module Risu
|
|
23
|
+
module Parsers
|
|
24
|
+
module Nessus
|
|
25
|
+
module PostProcess
|
|
26
|
+
class DellIDracRollup < Risu::Base::PostProcessBase
|
|
27
|
+
|
|
28
|
+
#
|
|
29
|
+
def initialize
|
|
30
|
+
@info =
|
|
31
|
+
{
|
|
32
|
+
:description => "Dell iDRAC Products Patch Rollup",
|
|
33
|
+
:plugin_id => -99947,
|
|
34
|
+
:plugin_name => "Missing the latest Dell iDRAC Patches",
|
|
35
|
+
:item_name => "Update to the latest Dell iDRAC",
|
|
36
|
+
:plugin_ids => [
|
|
37
|
+
109208, #Dell iDRAC Products Multiple Vulnerabilities (Mar 2018)
|
|
38
|
+
111604, #Dell iDRAC Products Multiple Vulnerabilities (June 2018)
|
|
39
|
+
119833, #Dell iDRAC Products Multiple Vulnerabilities (December 2018)
|
|
40
|
+
90265, #Dell iDRAC6 / iDRAC7 / iDRAC8 Path Traversal Authentication Bypass
|
|
41
|
+
|
|
42
|
+
]
|
|
43
|
+
}
|
|
44
|
+
end
|
|
45
|
+
end
|
|
46
|
+
end
|
|
47
|
+
end
|
|
48
|
+
end
|
|
49
|
+
end
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -43,13 +43,15 @@ module Risu
|
|
|
43
43
|
|
|
44
44
|
@plugins_to_severity = {
|
|
45
45
|
41028 => 0, # SNMP Agent Default Community Name (public) - 41028
|
|
46
|
-
|
|
46
|
+
10264 => 0, # SNMP Agent Default Community Names - 10264
|
|
47
47
|
10081 => 0, # FTP Privileged Port Bounce Scan - 10081
|
|
48
48
|
42411 => 0, # Microsoft Windows SMB Shares Unprivileged Access
|
|
49
49
|
66349 => 0, # X Server Unauthenticated Access: Screenshot
|
|
50
50
|
26925 => 0, # VNC Server Unauthenticated Access
|
|
51
51
|
66174 => 0, # VNC Server Unauthenticated Access: Screenshot
|
|
52
52
|
10205 => 0, # rlogin Service Detection
|
|
53
|
+
20007 => 2, # SSL Version 2 and 3 Protocol Detection
|
|
54
|
+
80101 => 2, # IPMI v2.0 Password Hash Disclosure
|
|
53
55
|
}
|
|
54
56
|
end
|
|
55
57
|
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -31,13 +31,14 @@ module Risu
|
|
|
31
31
|
{
|
|
32
32
|
:description => "Dropbear SSH Server Patch Rollup",
|
|
33
33
|
:plugin_id => -99952,
|
|
34
|
-
:plugin_name => "
|
|
34
|
+
:plugin_name => "Missing the latest Dropbear SSH Server Patches",
|
|
35
35
|
:item_name => "Update to the latest Dropbear SSH Server",
|
|
36
36
|
:plugin_ids => [
|
|
37
|
-
93650,
|
|
38
|
-
58183,
|
|
39
|
-
|
|
40
|
-
|
|
37
|
+
93650, #Dropbear SSH Server < 2016.72 Multiple Vulnerabilities
|
|
38
|
+
58183, #Dropbear SSH Server Channel Concurrency Use-after-free Remote Code Execution
|
|
39
|
+
70545, #Dropbear SSH Server < 2013.59 Multiple Vulnerabilities
|
|
40
|
+
21023, #Dropbear SSH Authorization-pending Connection Saturation DoS
|
|
41
|
+
34769, #Dropbear SSH Server svr_ses.childpidsize Remote Overflow
|
|
41
42
|
]
|
|
42
43
|
}
|
|
43
44
|
end
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -31,13 +31,11 @@ module Risu
|
|
|
31
31
|
{
|
|
32
32
|
:description => "FileZilla Client Patch Rollup",
|
|
33
33
|
:plugin_id => -99974,
|
|
34
|
-
:plugin_name => "
|
|
34
|
+
:plugin_name => "Missing the latest FileZilla Client Patches",
|
|
35
35
|
:item_name => "Update to the latest FileZilla Client",
|
|
36
36
|
:plugin_ids => [
|
|
37
|
-
69476,
|
|
38
|
-
69494,
|
|
39
|
-
|
|
40
|
-
|
|
37
|
+
69476, #FileZilla Client < 3.7.2 SFTP Integer Overflow
|
|
38
|
+
69494, #FileZilla Client < 3.7.3 Multiple Vulnerabilities
|
|
41
39
|
]
|
|
42
40
|
}
|
|
43
41
|
end
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# Copyright (c) 2010-
|
|
1
|
+
# Copyright (c) 2010-2020 Jacob Hammack.
|
|
2
2
|
#
|
|
3
3
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
4
4
|
# of this software and associated documentation files (the "Software"), to deal
|
|
@@ -31,78 +31,120 @@ module Risu
|
|
|
31
31
|
{
|
|
32
32
|
:description => "Firefox Patch Rollup",
|
|
33
33
|
:plugin_id => -99972,
|
|
34
|
-
:plugin_name => "
|
|
34
|
+
:plugin_name => "Missing the latest Firefox Patches",
|
|
35
35
|
:item_name => "Update to the latest Firefox",
|
|
36
36
|
:plugin_ids => [
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
82583,
|
|
54
|
-
85386,
|
|
55
|
-
62998,
|
|
56
|
-
63551,
|
|
57
|
-
64723,
|
|
58
|
-
65131,
|
|
59
|
-
65806,
|
|
60
|
-
66480,
|
|
61
|
-
66993,
|
|
62
|
-
69269,
|
|
63
|
-
69993,
|
|
64
|
-
70716,
|
|
65
|
-
70949,
|
|
66
|
-
71347,
|
|
67
|
-
72331,
|
|
68
|
-
85275,
|
|
69
|
-
85689,
|
|
70
|
-
86071,
|
|
71
|
-
86764,
|
|
72
|
-
87476,
|
|
73
|
-
86418,
|
|
74
|
-
88461,
|
|
75
|
-
89875,
|
|
76
|
-
90793,
|
|
77
|
-
91547,
|
|
78
|
-
88754,
|
|
79
|
-
92755,
|
|
80
|
-
93662,
|
|
81
|
-
94960,
|
|
82
|
-
95475,
|
|
83
|
-
95886,
|
|
84
|
-
96776,
|
|
85
|
-
97639,
|
|
86
|
-
99125,
|
|
87
|
-
99632,
|
|
88
|
-
100127,
|
|
89
|
-
55901,
|
|
90
|
-
56334,
|
|
91
|
-
56750,
|
|
92
|
-
57768,
|
|
93
|
-
57769,
|
|
94
|
-
58006,
|
|
95
|
-
58349,
|
|
96
|
-
58898,
|
|
97
|
-
59407,
|
|
98
|
-
60043,
|
|
99
|
-
61715,
|
|
100
|
-
62580,
|
|
101
|
-
62589,
|
|
102
|
-
94232,
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
37
|
+
73099, #Firefox < 28.0 Multiple Vulnerabilities
|
|
38
|
+
73769, #Firefox < 29.0 Multiple Vulnerabilities
|
|
39
|
+
74440, #Firefox < 30.0 Multiple Vulnerabilities
|
|
40
|
+
76763, #Firefox < 31.0 Multiple Vulnerabilities
|
|
41
|
+
77500, #Firefox < 32.0 Multiple Vulnerabilities
|
|
42
|
+
77906, #Firefox < 32.0.3 NSS Signature Verification Vulnerability
|
|
43
|
+
78473, #Firefox < 33.0 Multiple Vulnerabilities
|
|
44
|
+
79665, #Firefox < 34.0 Multiple Vulnerabilities
|
|
45
|
+
80523, #Firefox < 35 Multiple Vulnerabilities
|
|
46
|
+
81521, #Firefox < 36 Multiple Vulnerabilities
|
|
47
|
+
82040, #Firefox < 36.0.3 JIT Code Execution
|
|
48
|
+
82041, #Firefox < 36.0.4 SVG Bypass Privilege Escalation
|
|
49
|
+
82503, #Firefox < 37.0 Multiple Vulnerabilities
|
|
50
|
+
82998, #Firefox < 37.0.2 Failed Plugin Memory Corruption
|
|
51
|
+
83439, #Firefox < 38.0 Multiple Vulnerabilities
|
|
52
|
+
84581, #Firefox < 39.0 Multiple Vulnerabilities (Logjam)
|
|
53
|
+
82583, #Firefox < 37.0.1 HTTP/2 Alt-Svc Header Certificate Verification Bypass
|
|
54
|
+
85386, #Firefox < 40 Multiple Vulnerabilities
|
|
55
|
+
62998, #Firefox < 17.0 Multiple Vulnerabilities
|
|
56
|
+
63551, #Firefox < 18.0 Multiple Vulnerabilities
|
|
57
|
+
64723, #Firefox < 19.0 Multiple Vulnerabilities
|
|
58
|
+
65131, #Firefox < 19.0.2 nsHTMLEditor Use-After-Free
|
|
59
|
+
65806, #Firefox < 20 Multiple Vulnerabilities
|
|
60
|
+
66480, #Firefox < 21.0 Multiple Vulnerabilities
|
|
61
|
+
66993, #Firefox < 22.0 Multiple Vulnerabilities
|
|
62
|
+
69269, #Firefox < 23.0 Multiple Vulnerabilities
|
|
63
|
+
69993, #Firefox < 24.0 Multiple Vulnerabilities
|
|
64
|
+
70716, #Firefox < 25.0 Multiple Vulnerabilities
|
|
65
|
+
70949, #Firefox < 25.0.1 NSS and NSPR Multiple Vulnerabilities
|
|
66
|
+
71347, #Firefox < 26.0 Multiple Vulnerabilities
|
|
67
|
+
72331, #Firefox < 27.0 Multiple Vulnerabilities
|
|
68
|
+
85275, #Firefox < 39.0.3 PDF Reader Arbitrary File Access
|
|
69
|
+
85689, #Firefox < 40.0.3 Multiple Vulnerabilities
|
|
70
|
+
86071, #Firefox < 41 Multiple Vulnerabilities
|
|
71
|
+
86764, #Firefox < 42 Multiple Vulnerabilities
|
|
72
|
+
87476, #Firefox < 43 Multiple Vulnerabilities
|
|
73
|
+
86418, #Firefox < 41.0.2 'fetch' API Cross-Origin Bypass
|
|
74
|
+
88461, #Firefox < 44 Multiple Vulnerabilities
|
|
75
|
+
89875, #Firefox < 45 Multiple Vulnerabilities
|
|
76
|
+
90793, #Firefox < 46 Multiple Vulnerabilities
|
|
77
|
+
91547, #Firefox < 47 Multiple Vulnerabilities
|
|
78
|
+
88754, #Firefox < 44.0.2 Service Workers Security Bypass
|
|
79
|
+
92755, #Firefox < 48 Multiple Vulnerabilities
|
|
80
|
+
93662, #Mozilla Firefox < 49.0 Multiple Vulnerabilities
|
|
81
|
+
94960, #Mozilla Firefox < 50.0 Multiple Vulnerabilities
|
|
82
|
+
95475, #Mozilla Firefox < 50.0.2 nsSMILTimeContainer.cpp SVG Animation RCE
|
|
83
|
+
95886, #Mozilla Firefox < 50.1 Multiple Vulnerabilities
|
|
84
|
+
96776, #Mozilla Firefox < 51.0 Multiple Vulnerabilities
|
|
85
|
+
97639, #Mozilla Firefox < 52.0 Multiple Vulnerabilities
|
|
86
|
+
99125, #Mozilla Firefox < 52.0.1 CreateImageBitmap RCE
|
|
87
|
+
99632, #Mozilla Firefox < 53 Multiple Vulnerabilities
|
|
88
|
+
100127, #Mozilla Firefox < 53.0.2 ANGLE Graphics Library RCE
|
|
89
|
+
55901, #Firefox 3.6 < 3.6.20 Multiple Vulnerabilities
|
|
90
|
+
56334, #Firefox 3.6.x < 3.6.23 Multiple Vulnerabilities
|
|
91
|
+
56750, #Firefox 3.6.x < 3.6.24 Multiple Vulnerabilities
|
|
92
|
+
57768, #Firefox < 10.0 Multiple Vulnerabilities
|
|
93
|
+
57769, #Firefox 3.6.x < 3.6.26 Multiple Vulnerabilities
|
|
94
|
+
58006, #Firefox 3.6.x < 3.6.27 'png_decompress_chunk' Integer Overflow
|
|
95
|
+
58349, #Firefox 3.6.x < 3.6.28 Multiple Vulnerabilities
|
|
96
|
+
58898, #Firefox < 12.0 Multiple Vulnerabilities
|
|
97
|
+
59407, #Firefox < 13.0 Multiple Vulnerabilities
|
|
98
|
+
60043, #Firefox < 14.0 Multiple Vulnerabilities
|
|
99
|
+
61715, #Firefox < 15.0 Multiple Vulnerabilities
|
|
100
|
+
62580, #Firefox < 16.0 Multiple Vulnerabilities
|
|
101
|
+
62589, #Firefox < 16.0.1 Multiple Vulnerabilities
|
|
102
|
+
94232, #Mozilla Firefox 48.x / 49.x < 49.0.2 Multiple Vulnerabilities
|
|
103
|
+
102359, #Mozilla Firefox < 55 Multiple Vulnerabilities
|
|
104
|
+
100810, #Mozilla Firefox < 54 Multiple Vulnerabilities
|
|
105
|
+
103680, #Mozilla Firefox < 56 Multiple Vulnerabilities
|
|
106
|
+
99631, #Mozilla Firefox ESR 52.x < 52.1 Multiple Vulnerabilities
|
|
107
|
+
100126, #Mozilla Firefox ESR 52.x < 52.1.1 ANGLE Graphics Library RCE
|
|
108
|
+
100809, #Mozilla Firefox ESR < 52.2 Multiple Vulnerabilities
|
|
109
|
+
102358, #Mozilla Firefox ESR < 52.3 Multiple Vulnerabilities
|
|
110
|
+
104637, #Mozilla Firefox ESR < 52.5 Multiple Vulnerabilities
|
|
111
|
+
105212, #Mozilla Firefox ESR < 52.5.2 Multiple Vulnerabilities
|
|
112
|
+
106302, #Mozilla Firefox ESR < 52.6 Multiple Vulnerabilities
|
|
113
|
+
103679, #Mozilla Firefox ESR < 52.4 Multiple Vulnerabilities
|
|
114
|
+
108376, #Mozilla Firefox ESR < 52.7 Multiple Vulnerabilities
|
|
115
|
+
108586, #Mozilla Firefox ESR < 52.7.2 Multiple Code Execution Vulnerabilities
|
|
116
|
+
108755, #Mozilla Firefox ESR < 52.7.3 Denial of Service Vulnerability
|
|
117
|
+
104638, #Mozilla Firefox < 57 Multiple Vulnerabilities
|
|
118
|
+
105213, #Mozilla Firefox < 57.0.2 ANGLE Graphics Library RCE
|
|
119
|
+
106303, #Mozilla Firefox < 58 Multiple Vulnerabilities
|
|
120
|
+
106561, #Mozilla Firefox < 58.0.1 Arbitrary Code Execution
|
|
121
|
+
108377, #Mozilla Firefox < 59 Multiple Vulnerabilities
|
|
122
|
+
108587, #Mozilla Firefox < 59.0.1 Multiple Code Execution Vulnerabilities
|
|
123
|
+
108756, #Mozilla Firefox ESR < 59.0.2 Denial of Service Vulnerability
|
|
124
|
+
109869, #Mozilla Firefox < 60 Multiple Critical Vulnerabilities
|
|
125
|
+
105040, #Mozilla Firefox < 57.0.1 Multiple Vulnerabilities
|
|
126
|
+
105616, #Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre)
|
|
127
|
+
110811, #Mozilla Firefox < 61 Multiple Critical Vulnerabilities
|
|
128
|
+
117294, #Mozilla Firefox < 62 Multiple Critical Vulnerabilities
|
|
129
|
+
118397, #Mozilla Firefox < 63 Multiple Vulnerabilities
|
|
130
|
+
117921, #Mozilla Firefox < 62.0.3 Multiple Vulnerabilities
|
|
131
|
+
117941, #Mozilla Firefox < 49 Multiple Vulnerabilities
|
|
132
|
+
122948, #Mozilla Firefox < 66.0
|
|
133
|
+
123012, #Mozilla Firefox < 66.0.1
|
|
134
|
+
121512, #Mozilla Firefox < 65.0
|
|
135
|
+
125361, #Mozilla Firefox < 67.0
|
|
136
|
+
126002, #Mozilla Firefox < 67.0.3
|
|
137
|
+
126072, #Mozilla Firefox < 67.0.4
|
|
138
|
+
121477, #Mozilla Firefox ESR < 60.5
|
|
139
|
+
109868, #Mozilla Firefox ESR < 52.8 Multiple Critical Vulnerabilities
|
|
140
|
+
110809, #Mozilla Firefox ESR < 52.9 Multiple Critical Vulnerabilities
|
|
141
|
+
125877, #Mozilla Firefox < 67.0.2
|
|
142
|
+
117668, #Mozilla Firefox < 62.0.2 Vulnerability
|
|
143
|
+
119604, #Mozilla Firefox < 64.0 Multiple Vulnerabilities
|
|
144
|
+
122233, #Mozilla Firefox < 65.0.1
|
|
145
|
+
126622, #Mozilla Firefox < 68.0
|
|
146
|
+
128061, #Mozilla Firefox < 68.0.2
|
|
147
|
+
128525, #Mozilla Firefox < 69.0
|
|
106
148
|
]
|
|
107
149
|
}
|
|
108
150
|
end
|