troubadix 24.10.2__py3-none-any.whl → 25.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
troubadix/__version__.py CHANGED
@@ -2,4 +2,4 @@
2
2
 
3
3
  # THIS IS AN AUTOGENERATED FILE. DO NOT TOUCH!
4
4
 
5
- __version__ = "24.10.2"
5
+ __version__ = "25.1.1"
@@ -20,3 +20,5 @@ sequested->requested
20
20
  entrepris->enterprise
21
21
  entreprise->enterprise
22
22
  entreprises->enterprises
23
+ iit->it
24
+ itt->it
@@ -19,18 +19,32 @@
19
19
  # 0x01D0: 45 20 63 6F 6D 6D 61 6E 64 20 72 65 63 65 69 76 E command receiv
20
20
  0x02, # ByteOrder (little endian)
21
21
  # 0x06B0: 0B A5 3D 1F FF AC 6A C7 1E 4A 4A 84 6E 44 FF 6A ..=...j..JJ.nD.j
22
+ 0x06F0: 6E 73 3D 22 68 74 74 70 3A 2F 2F 73 63 68 65 6D ns="http://schem
23
+ 0x10: 6F 6E 74 72 6F 6C 73 00 ontrols.
22
24
  # 0x10: 70 65 63 69 66 69 65 64 20 75 73 65 72 2E 0D 0A pecified user...
25
+ 0x20: 31 32 36 33 36 37 37 30 14 00 00 05 61 64 6D 69 12636770....admi
26
+ 0x20: 36 34 35 31 39 34 39 32 14 00 00 05 41 44 4D 49 64519492....ADMI
27
+ 0x20: 38 35 35 33 32 38 37 39 14 00 00 0D 41 64 6D 69 85532879....Admi
28
+ 0x20: 3B DD CF 0F 0C 9D EA 56 14 00 00 0D 41 64 6D 69 ;......V....Admi
29
+ 0x20: 3F 45 52 41 79 D2 51 73 14 00 00 05 41 64 6D 69 ?ERAy.Qs....Admi
23
30
  # 0x20: 64 79 0D 0A 45 52 52 4F 52 20 43 6F 6D 6D 61 6E dy..ERROR Comman
24
31
  # 0x20: 6D 65 73 73 61 67 65 2E 48 61 6E 64 73 68 61 6B message.Handshak
32
+ 0x20: 70 65 63 69 66 69 63 61 74 69 6F 6E 3A 20 53 41 pecification: SA
25
33
  # 0x20: 70 70 6C 69 63 61 74 69 6F 6E 2F 62 65 65 70 2B pplication/beep+
34
+ 0x20: C8 E6 AB 65 3B A9 5A 0E 14 00 00 05 41 44 4D 49 ...e;.Z.....ADMI
35
+ 0x20: D5 A6 22 5D 33 E4 C6 0E 14 00 00 05 61 64 6D 69 .."]3.......admi
36
+ 0x40: 61 6C 64 6F 6D 61 69 6E 00 07 64 65 66 61 75 6C aldomain..defaul
26
37
  # 0x50: 72 6F 2E 70 72 6F 64 75 63 74 2E 64 65 76 69 63 ro.product.devic
27
38
  # 0x50: 74 72 69 6E 67 20 6D 69 73 73 69 6E 67 20 6F 72 tring missing or
28
39
  # 0x50: 75 65 73 74 3A 20 47 45 54 20 2F 20 uest: GET / # nb: Trailing space
29
40
  # 0x50: A1 37 43 6F 6E 6E 65 63 74 69 6F 6E 20 66 72 6F .7Connection fro
41
+ 0x60: 73 65 72 2C 73 65 72 76 69 63 65 3A 6C 69 67 68 ser,service:ligh
30
42
  #0x60: AC 13 28 D3 B3 A5 BA F0 FD D6 FA 22 BF 4D F2 4D ..(........".M.M
31
43
  10001 from WAN (if port-forwarding is enabled to allow remote configuration, then it is a good
44
+ 1011, "ITT",
32
45
  1047, "WIT",
33
46
  1153, "Alga Automacao e controle LTDA",
47
+ 1167, "ITT Water & Wastewater AB",
34
48
  1212, "HSA Systems",
35
49
  1289, "HMS/BU Ewon",
36
50
  1638, "Hach",
@@ -58,6 +72,7 @@
58
72
  249, "Varian Vacuum Products",
59
73
  303, "Binar Elektronik AB",
60
74
  38, "CompoNet Repeater",
75
+ 3 TE!@ @q.¿¿¿¿¿ ¿y }'ac
61
76
  419, "GERBI & FASE S.p.A.(Fase Saldatura)",
62
77
  # 50: 4d 4c 20 5b 0a 20 20 20 3c 21 45 4c 45 4d 45 4e ML [. <!ELEMEN
63
78
  # 50: 4d 4c 20 5b 0a 20 20 20 3c 21 45 4c 45 4d 45 4e ML [. <!ELEMEN
@@ -94,16 +109,20 @@ Add more important informations
94
109
  "admin:admin:huawei,3com,allied,alteon,amitech,billon,checkpoint,cisco,com3,davox,dlink,draytek,dynalink,everfocus,flowpoint,foundry networks,hp,ibm,intel,ivanti:all,http,ssh,ftp",
95
110
  Admin endpoints to a public WAN (Internet) / public LAN without authentication.
96
111
  "Administrator:admin:cisco,conexant,corecess,gvc:all",
112
+ admin:[Password]:0:0:Adminstrator:/:/bin/sh
97
113
  # admin:<redacted>:0:0:Adminstrator:/:/bin/sh
114
+ admin:<redacted>:0:0:Adminstrator:/:/bin/sh
98
115
  "Admin|shs",
99
116
  "Adminstrator|",
100
117
  "adminstrator|changeme",
101
118
  "ADMN|admn",
102
119
  # ADSL Router, VxWorks SNMPv1/v2c Agent, Conexant System, Inc.
120
+ * Afer the new cloudfront changes, the new urls are of the format api.staging.symphony-dev.com/ni
103
121
  A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-20305)");
104
122
  Aftandilian, and Jordi Chancel as the original reporters.");
105
123
  Aftandilian, Paul Theriault, Julian Hector, Petr Cerny, Jordi Chancel, and
106
124
  - Agobot.FO
125
+ <a href="#" class="active help" onclick="BUI.openHelp('/help/popup/status');return false;">
107
126
  "aktivate",
108
127
  "aktivate/cgi-bin",
109
128
  Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia discovered that the OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side
@@ -146,12 +165,14 @@ Ari Kauppi from Synopsys Ltd discovered that the NFSv2 and NFSv3 server implemen
146
165
  Attackers can cause a denial of service (crash) via a crafted EXE file that crashes the UPack unpacker.
147
166
  Autoloader '%{pear_phpdir}/CAS/Autoload.php'<semicolon>");
148
167
  "bakup\n",
168
+ /bar/node_modules/soket.io/ | soket.io
149
169
  base:"cpe:/a:cas:commserver_ua:", expr:"^([0-9.]+)", insloc:location, regService:"smb-login", regPort:0);
150
170
  # Based on the work of Tim Brown <timb@nth-dimension.org.uk> as published
151
171
  batman-adv: bla: use netif_rx_ni whe... [Please see the references for more information on the vulnerabilities]");
152
172
  because of an initialization bug in the framework. This issue has been addressed in Mozilla products by explicitly turning off the framework's logging of input events. On vulnerable systems, this issue can result in private data such as usernames, passwords, and other inputed data being saved to a log file on the local system.
153
173
  Betriebssystems aktualisiert wurde. Ist dies nicht moeglich, MUSS alternativ Live-Patching des
154
174
  big = crap(clen - len);
175
+ bin:x:2:2:bin:/bin:/bin/fals
155
176
  bit32_lines = make_list('-a always,exit -F arch=b32 -S creat -S open -S openat -S truncate -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k access',
156
177
  bit64_lines = make_list('-a always,exit -F arch=b64 -S creat -S open -S openat -S truncate -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k access',
157
178
  BMX NOE 0100 (H) prior to version 3.3, BMX NOE 0110 (H) prior to version 6.5 and BMX NOC 0401 prior to
@@ -220,6 +241,8 @@ cmd = 'nft list ruleset | awk \'/hook input/,/}/\' | grep \'[iif "lo" accept,ip
220
241
  common_files_dir_id = 'oval:org.mitre.oval:obj:281';
221
242
  Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME)
222
243
  # Comparison Engine Power 'product.comparision.php' SQL Injection Vulnerability
244
+ compiletime=2023-12-15-01-15-04
245
+ compiletime=2023-12-20-02-00-25
223
246
  complete_xml = string (complete_xml, '<oval_system_characteristics xmlns="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5" xmlns:ind-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#independent" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5" xmlns:win-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5 oval-system-characteristics-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#windows windows-system-characteristics-schema.xsd http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#independent independent-system-characteristics-schema.xsd">');
224
247
  "config.sys", "io.sys", "msdos.sys", "pagefile.sys",
225
248
  Connection, Expect, If-Match, If-None-Match, If-Range, If-Unmodified-Since, Max-Forwards, TE,
@@ -243,6 +266,7 @@ CPE = "cpe:/a:mapp:webtrekk:";
243
266
  cpe = "cpe:/a:mitre:ovaldi";
244
267
  CPE = "cpe:/a:netsparker:wass";
245
268
  CPE = "cpe:/a:tawk:tawk.to_live_chat";
269
+ CPE: cpe:/a:tawk:tawk.to_live_chat:0.8.0
246
270
  cpe =~ "^cpe:/o:hp:laserjet_pro_420[1-3](cdn|dn|dw|dne|dwe)_firmware") {
247
271
  CPU' could have occured because a retry loop continually finds the same
248
272
  crafted IFF ILBM file. NOTE: some of these details are obtained from
@@ -252,6 +276,8 @@ Create all system-defined macros defore processing command-line given
252
276
  csd_version_id = 'oval:org.mitre.oval:obj:717';
253
277
  csrsrv_file_id = 'oval:org.mitre.oval:obj:2045';
254
278
  csrsrv_file_variable_id = 'oval:org.mitre.oval:var:200';
279
+ <!-- CSS Tabs alle Reiter fuer die Topnavi-->
280
+ <!-- CSS Tabs alle Reiter fuer die Topnavi-->
255
281
  - Ctdb: open the ro tracking db with perms 0600 instead of 0000
256
282
  - Ctdb: open the ro tracking db with perms 0600 instead of 0000,
257
283
  CVE-2008-4210: When creating a file, open()/creat() allowed the setgid
@@ -330,9 +356,12 @@ default_cgis = make_list( "/v2/api/product/manger/getInfo", "/v2/api/product/man
330
356
  delete = script_get_preference( "Delete hash test Programm after the test", id:3 );
331
357
  demuxer that could result in excessive amount of ressource allocation
332
358
  * Dependency needed for the MozillaThunderbird udpate");
359
+ desc: "Acronis Cyber Infrastructure (ACI) Detection (HTTP)");
333
360
  desc = "Diese Vorgabe muss manuell ueberprueft werden.";
334
361
  desc = "Host ist kein Microsoft Windows 10 System.";
335
362
  designVer = get_kb_item("Adobe/LiveCycle/Designer");
363
+ Detected Acronis Cyber Infrastructure (ACI)
364
+ Detected Tawk.To Live Chat
336
365
  detection_english_match = re.search('"(Run\s+Windows\s+Update\s+and\s+(update|install)\s+the\s+listed\s+hotfixes\s+or\s+download\s+and\s+(update|install\s+the)\s+(mentioned\s+)?hotfixes\s+(in|from)(\s+the)?(\s+referenced)?\s+(advisory|avdisory)\.?(\s*(For\s+(details|updates)\s+refer\s+to(\s+the)?\s+reference\s+links?|Please\s+see\s+the\s+references\s+for\s+more\s+information)\.?)?)"', text, re.IGNORECASE)
337
366
  "developement\n",
338
367
  # |/dev/hda|ST3160021A|UNK|*||/dev/hdc|???|ERR|*||/dev/hdg|Maxtor 6B200P0|UNK|*||/dev/hdh|Maxtor 6Y160P0|38|C|
@@ -344,10 +373,15 @@ Die Standard-Anforderung 'A7: Lokale Sicherheitsrichtlinien' beschreibt, dass un
344
373
  disable, or enable CAs causing various denial of service problems with
345
374
  display debugging information to the requestor. It is recommended that such debug information be
346
375
  distrust all of DigiNotar's CAs. In this update, this is done in the
376
+ <div class="pannel">
377
+ <div class="pannel last">
378
+ <div class="text-muted">Select this option if you have a working phpipam installation and this screen occured. Generally it means
347
379
  (divide-by-zero error and QEMU process crash) via a larg... [Please see the references for more information on the vulnerabilities]");
380
+ <div id="table-list"><table id="table-content"><thead class="t-header"><tr><th class="colname" aria-sort="ascending"><a class="name" href="?ND" onclick="return false"">Name</a></th><th class="colname" data-sort-method="number"><a href="?MA" onclick="return false"">Last Modified</a></th><th class="colname" data-sort-method="number"><a href="?SA" onclick="return false"">Size</a></th></tr></thead>
348
381
  # <div style="float: right; margin-top: 5px; margin-right: 5px;">Rev. 1.04.06&nbsp;&nbsp;&nbsp;&nbsp;Bulid. 20150226142928 </div>
349
382
  # <div style="float: right; margin-top: 5px; margin-right: 5px;">Rev. 1.04.07&nbsp;&nbsp;&nbsp;&nbsp;Bulid. 20150925151332 </div>
350
383
  Docker compatability (#3340)
384
+ // do not appear to be used anywhere other than the CustomEventManager, but leaving these for backwards compatability
351
385
  - Don't discard stap probe note sections on aarch64 (#1225091)
352
386
  drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
353
387
  - drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4)
@@ -359,8 +393,12 @@ else if (prod =~ "^BMX\s*NOE\s*0100$" || prod =~ "^BMX\s*NOE\s*0100H$") {
359
393
  else if (prod =~ "^BMX\s*NOE\s*0110$" || prod =~ "^BMX\s*NOE\s*0110H$") {
360
394
  else if( svc == "agobot.fo" )
361
395
  Enable log information of starting/stoping services. (bsc#1144923,
396
+ <!-- Ende Footer-->
397
+ <!-- Ende Footer-->
398
+ <!-- Ende Message Box -->
362
399
  Engineering (TE) database and then a subsequent operation attempts to process these, rpd will
363
400
  Engineering (TE) tunnel's physical source interface is not propagated to hardware after the adjacency is lost.
401
+ - ERRO[0000] Error creating docker key file: CreateKeyFile write root.key file failed. open /root/.docker/root.key: permission denied
364
402
  eSpace IAD, eSpace U1981 and eSpace USM.");
365
403
  establishment of the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch
366
404
  exact-width integer types int{N}_t and uint{N}_t.
@@ -407,6 +445,7 @@ fixtext = 'Add rules to audit the system calls "creat", "open/openat" and "trunc
407
445
  Fix typo in preference name: "password" misspelled as "pasword".
408
446
  "fo",
409
447
  #<FONT SIZE="+3">S</FONT>EARCH
448
+ /foo/node_modules/soket.io/ | soket.io
410
449
  - For backwards compatability, setting --log-driver=json-file in podman
411
450
  foreach dir( make_list_unique( "/ag", "/ang", "/guestbook", "/anguestbook", http_cgi_dirs( port:port ) ) ) {
412
451
  foreach dir(make_list_unique("/", "/annonce", http_cgi_dirs(port:port))) {
@@ -422,6 +461,7 @@ For the stable distribution (sarge) these problems have been fixed in version 0.
422
461
  For the stable distribution (sarge) this problem has been fixed in version 178-1sarge3. Due to technical problems with the security buildd infrastructure this update lacks a build for the Sun Sparc architecture. It will be released as soon as the problems are resolved.
423
462
  For the stable distribution (sarge) this problem has been fixed in version 4.0.2-4.1sarge1. Due to technical problems with the security buildd infrastructure this update lacks a build for the Sun Sparc architecture. It will be released as soon as the problems are resolved.
424
463
  "foto",
464
+ Found by VT: 1.3.6.1.4.1.25623.1.0.153333 (Acronis Cyber Infrastructure (ACI) Detection (HTTP))
425
465
  found/known outside kde4 enviroment/session
426
466
  fpr = tmpfpr[0];
427
467
  * Fri Nov 27 2009 Remi Collet 1.1.14-5
@@ -429,7 +469,9 @@ For the stable distribution (sarge) this problem has been fixed in version 4.0.2
429
469
  from both LAN and WAN.");
430
470
  ftpcmd["EPRT"]=1; ftpcmd["EPSV"]=1; ftpcmd["ALLO"]=1; ftpcmd["RNFR"]=1;
431
471
  fuer Betriebssystem und Daten genutzt werden. Alternativ SOLLTEN auch Mechanismen des verwendeten
472
+ # FUJI XEROX DocuColor 1450 GA ;ESS1.102.18,IOT 72.51.0,HCF 3.33.0,FIN C18.29.0,IIT 7.10.0,ADF 21.3.0,SJFI3.0.17,SSMI1.15.2
432
473
  function may have writen data beyond the target buffer, leading to a
474
+ function pressEnter(e)
433
475
  Furthemore, the following bugs were fixed:
434
476
  Furthermore, a severe flaw had been discovered by Tim Duesterhus in
435
477
  Furthermore Microsoft Exchange CAS and OWA as well as other webservers or load balancers might be also affected.");
@@ -446,6 +488,8 @@ Gigabit WAN VPN Router and the RV325 Dual Gigabit WAN VPN Router could allow an
446
488
  * groupd no longer allows the default fence d ...
447
489
  Grundschutz. Die detaillierte Beschreibung zu dieser Massnahme findet sich unter
448
490
  guess += '\n- Huawei TE Device';
491
+ <h2>Autentication<a href "./main.html</a></h2>
492
+ <h3 lang="it">Ore di lavoro</h3>
449
493
  "hanlder\n",
450
494
  have resul... [Please see the references for more information on the vulnerabilities]");
451
495
  * Heap-based buffer overflow when scanning crypted PE files
@@ -454,10 +498,14 @@ Helin, Andre Bargull, Massimiliano Tomassoli, laf.intel, Massimiliano
454
498
  "H", "HSI",
455
499
  - HP Helion Eucalyptus does not correctly check IAM user's permissions for accessing versioned objects and ACLs.
456
500
  hp_printer['login_success'] = '<?hp te.includeSubPage';
501
+ </HSI>
502
+ <HSI>
457
503
  # <HTML>Acess not granted.</HTML>
458
504
  # <HTML>Acess to resource EDITION not granted.</HTML>
459
505
  # http://nto.github.io/AirPlay.html#video-httprequests
506
+ http://<redacted>/ews/status/infomation.htm
460
507
  - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-
508
+ https://<redacted>/wp-content/plugins/mailin/readme.txt
461
509
  # Huawei TE Device Detection
462
510
  # Huawei TE Devices Multiple Vulnerabilities
463
511
  hypervisor crash leading to a Denial of Servce. (XSA-203, bsc#1014300,
@@ -543,6 +591,11 @@ If you disable this policy setting, transcripting of PowerShell-based applicatio
543
591
  If you enable this policy setting, Windows PowerShell will enable transcripting for Windows
544
592
  Ignore root CAs.
545
593
  iif = ssh_cmd( socket:sock, cmd:'nft list ruleset | awk \'/hook input/,/}/\' | grep \'iif "lo" accept\'', nosh:TRUE, return_errors:FALSE );
594
+ ii libapt-pkg4.12 0.8.16~exp12ubuntu10.29 package managment runtime library
595
+ ii libapt-pkg4.12:amd64 0.9.7.5ubuntu5.6 amd64 package managment runtime library
596
+ ii libapt-pkg4.12:amd64 0.9.7.7ubuntu6 amd64 package managment runtime library
597
+ ii libapt-pkg4.12:amd64 0.9.7.9+deb7u7 amd64 package managment runtime library
598
+ ii libapt-pkg4.12:amd64 0.9.9.1~ubuntu3.3 amd64 package managment runtime library
546
599
  image. This occured because of a lack of proper validation that cached
547
600
  Imaging and Communications in Medicine (DICOM) service accessible from a public WAN (Internet) /
548
601
  Imaging and Communications in Medicine (DICOM) web viewer accessible from a public WAN (Internet)
@@ -552,6 +605,8 @@ If you enable this policy setting, Windows PowerShell will enable transcripting
552
605
  Inbuilt protection in ps maped a guard page at the end of the overflowed
553
606
  include("CAs.inc");
554
607
  inheritence not possible in abstract classes) [bnc#783239]
608
+ <input type="password" name="password" id="password" onkeydown="return pressEnter(event)">
609
+ <input type="text" name="username" id="username" onkeydown="return pressEnter(event)">
555
610
  install = script_get_preference( "Install hash test Programm on the Target", id:2 );
556
611
  interface accessible from a public WAN (Internet) / public LAN and with auto-logon enabled.
557
612
  interface for Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated,
@@ -585,6 +640,7 @@ It was found that if a Non-Maskable Interrupt (NMI) occurred immediately after a
585
640
  James Troup discovered that snap did not properly manage the permissions for
586
641
  James web admin endpoints to a public WAN (Internet) / public LAN without authentication.");
587
642
  Jan-Ivar Bruaroey, Jesse Ruderman, Markus Stange, Olli Pettay, Ehsan
643
+ <java.util.logging.manager>org.apache.juli.ClassLoaderLogManager</java.util.logging.manager>
588
644
  javax/security/auth/Subject/doAs/NestedActions.java fails if extra
589
645
  "jave",
590
646
  Jesse Hertz and Tim Newsham discovered that the Linux netfilter
@@ -621,14 +677,20 @@ keyserv 100029 keyserver
621
677
  kJtP0F6mv/Afe/5s7yd3ZJ/72yT73NjLg0vWbmLkop6eOR+CKw4nxorWxpocAj0p
622
678
  # Kubernetes Dashboard Public WAN (Internet) Accessible
623
679
  L3: conring size for XEN HV's with huge memory to small. Inital Xen logs
680
+ LAST_PATCH_UPDATE UpToDate
624
681
  leaks because of a missing check when transfering pages via
625
682
  library: Increment to 7:0:1 No changes, no removals New fuctions:
626
683
  [link moved to references] has more informations.
684
+ <link rel="stylesheet" href="/bui/base.css?v=GWAY-8.3.1-0086" />
685
+ <link rel="stylesheet" href="/bui/cui.css?v=GWAY-8.3.1-0086" />
686
+ <link rel="stylesheet" href="/bui/reset-cui.css?v=GWAY-8.3.1-0086" />
627
687
  list to be autodetected, STAC92HD71Bx and STAC92HD75Bx based HDA
628
688
  - LiveCycle 9.0, 8.2.1, and 8.0.1
629
689
  - LiveCycle Data Services 3.0, 2.6.1, and 2.5.1
630
690
  local_var _ciphers, _cipher, clen, time, _random, hello_data, ec_type, default_extension, tls_kb_vers, hde, hde_len, hdlen, data, hello_len, hello;
631
691
  local_var version, type, _ciphers, _cipher, clen, sessionid_len, challenge, challenge_len, hello_data, hd_len, hello;
692
+ Location: /wp-content/plugins/mailin
693
+ log_message(data: build_detection_report(app: "Acronis Cyber Infrastructure (ACI)", version: version,
632
694
  log_message(data: build_detection_report(app:"Adobe LiveCycle Designer",
633
695
  log_message(data: build_detection_report(app: "OpenMairie Open Presse", version: version,
634
696
  log_message(data: build_detection_report(app: "OpenMairie Open Registre CIL", version: version,
@@ -636,6 +698,7 @@ list to be autodetected, STAC92HD71Bx and STAC92HD75Bx based HDA
636
698
  log_message( port:port, data:"A Conexant configuration interface is running on this port" );
637
699
  log_message( port:port, data:"An Agobot.fo backdoor is running on this port" );
638
700
  log_message( port:port, data:"Interface of a Conexant ADSL router is running on this port" );
701
+ <!--Logo absolut positioniert-->
639
702
  M*)6UG-,[V6-;N*W*79^&[ND/.DM''*U8D?Q:.'+%RB;S$!.'6['*(;8>~A:>
640
703
  Mac OS X SMB2 implmenetation sees Input/output error or Resource
641
704
  "mailin/readme.txt", "Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue#---#=== (Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue|Sendinblue Subscribe Form And WP SMTP) ===#---#= Changelog(.*)#---#cpe:/a:sendinblue:newsletter%2c_smtp%2c_email_marketing_and_subscribe#---#= ([0-9.]+)",
@@ -746,6 +809,7 @@ or potentially have unspecified futher impact.
746
809
  '//oval.mitre.org/XMLSchema/oval-system-characteristi' +
747
810
  'oval-system-characteristics-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 ',
748
811
  overflow might have occured that allowed a malicious or buggy PV guest
812
+ <p>Access to this device is restriced and your IP address is not in the list of allowed host, hence access to this unit denied.</p>
749
813
  package. They're not used anymore becuse of systemd (bsc#1178396).
750
814
  packets are received on a specific port from outside the ACI fabric and destined to an endpoint
751
815
  "pass=&Servers-0-verbose_check=on&Servers-0-bookmarktable=&Ser",
@@ -754,6 +818,8 @@ paths = ssh_find_bin(prog_name:"stap", sock:sock);
754
818
  pattern:'<title>DNP LAN/WAN Status</title>','Electro Industries/GaugeTech',
755
819
  Paulo Bonzini discovered that the KVM implemen ...
756
820
  p_data_tf_types["00720073"] = "Selector OD Value";
821
+ phpipam was unable to connnect to the database. This will check for connection errors.</div>
822
+ Plugin Page: https://wordpress.org/plugins/mailin/
757
823
  pointers can be exploited to bypass CAS (Code Access Security) restrictions and disclose information.
758
824
  Poll for artifact blob, addresses goal state procesing issue
759
825
  postdata = string(postdata, "Content-Length: ", clen, "\r\n\r\n", boundary2, "\r\n");
@@ -765,6 +831,7 @@ Prevent sporious 'salt-api' stuck processes when managing SSH minions
765
831
  Prevent sporious 'salt-api' stuck processes when managing SSH minions.
766
832
  print("----- Using an link to Mitre/NVD within the script_xref -----\r\n")
767
833
  * Prior to this update, the Directory Server (DS) always checked the ACI
834
+ Proces
768
835
  processing malformed files packed with UPack.
769
836
  processing Upack files. A remote attacker could send a crafted file and
770
837
  processor_arch_id = 'oval:org.mitre.oval:obj:1576';
@@ -867,11 +934,14 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
867
934
  script_copyright("(c) Tim Brown and Portcullis Computer Security Ltd, 2008");
868
935
  script_mandatory_keys("AAS/banner");
869
936
  script_mandatory_keys("aas/detected");
937
+ script_mandatory_keys("acronis/aci/detected");
870
938
  script_mandatory_keys("Adobe/LiveCycle/Designer");
871
939
  script_mandatory_keys("Jasig CAS server/Installed");
872
940
  script_mandatory_keys("shttp/detected");
873
941
  script_mandatory_keys("telnet/huawei/te/detected");
874
942
  script_mandatory_keys("wordpress/plugin/mailin/detected");
943
+ script_name("Acronis Cyber Infrastructure (ACI) Detection (HTTP)");
944
+ script_name("Acronis Cyber Infrastructure (ACI) RCE Vulnerability (SEC-6452)");
875
945
  script_name("Adobe LiveCycle Designer Detection (Windows SMB Login)");
876
946
  script_name("Adobe LiveCycle Designer Untrusted Search Path Vulnerability - Windows");
877
947
  script_name("AIDA64 <= 6.25.5400 SEH Buffer Overflow Vulnerability");
@@ -923,6 +993,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
923
993
  script_name("WordPress Annonces Plugin 'abspath' Parameter RFI Vulnerability");
924
994
  script_name("WordPress Tawk.To Live Chat Plugin < 0.6.0 Broken Access Control Vulnerability");
925
995
  * scripts/CAs.inc:
996
+ script_tag(name:"affected", value:"Acronis Cyber Infrastructure (ACI) prior to version 5.0.1-61,
926
997
  script_tag(name:"affected", value:"Adobe LiveCycle Designer version ES2 9.0.0.20091029.1.612548
927
998
  script_tag(name:"affected", value:"Apple Mac OS X Big Sur versions 11.x before
928
999
  script_tag(name:"affected", value:"BA SYSTEMS BAS Web on BAS920 devices with
@@ -1034,6 +1105,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
1034
1105
  script_tag(name:"solution", value:"Since LSAT is not actively maintained anymore, this package has been
1035
1106
  script_tag(name:"solution", value:"Upgrade to Apple Mac OS X Big Sur version
1036
1107
  script_tag(name:"solution", value:"Upgrade to Frams&qt Fast File EXchange version 20140526 or later.");
1108
+ script_tag(name:"summary", value:"Acronis Cyber Infrastructure (ACI) is prone to a remote code
1037
1109
  script_tag(name:"summary", value:"Adobe LiveCycle Designer is prone to untrusted search path vulnerability.");
1038
1110
  script_tag(name:"summary", value:"A security vulnerability in Avenger's News System (ANS) allows
1039
1111
  script_tag(name:"summary", value:"A vulnerability in the Cisco ACI Multi-Site CloudSec encryption
@@ -1044,6 +1116,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
1044
1116
  script_tag(name:"summary", value:"Die Funktion, dass eingebettete Aktive Inhalte automatisch ausgefuehrt werden,
1045
1117
  script_tag(name:"summary", value:"Festplatten oder die darauf abgespeicherten Dateien SOLLTEN
1046
1118
  script_tag(name:"summary", value:"Frams&qt Fast File EXchange is prone to multiple vulnerabilities.");
1119
+ script_tag(name:"summary", value:"HTTP based detection of Acronis Cyber Infrastructure (ACI).");
1047
1120
  script_tag(name:"summary", value:"Juraj Somorovsky, Robert Merget and Nimrod Aviram discovered a padding
1048
1121
  script_tag(name:"summary", value:"Listet alle erfuellten Tests der 'AKIF Orientierungshilfe Windows 10 Ueberpruefung' auf.");
1049
1122
  script_tag(name:"summary", value:"Listet alle Fehler der 'AKIF Orientierungshilfe Windows 10 Uberpruefung' auf.");
@@ -1065,6 +1138,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
1065
1138
  script_tag(name:"summary", value:"Wen Bin discovered that bchunk, an application that converts a CD
1066
1139
  script_tag(name:"summary", value:"Ziel des Bausteins SYS.2.2.3 ist der Schutz von Informationen,
1067
1140
  script_tag(name:"vuldetect", value:"Checks if the Swarmpit UI is accessible from a public WAN
1141
+ <script type="text/javascript" src="/bui/bui.js?v=GWAY-8.3.1-0086"></script>
1068
1142
  script_xref(name:"URL", value:"http://cpe.mitre.org/");
1069
1143
  script_xref(name:"URL", value:"https://cwe.mitre.org/data/definitions/319.html");
1070
1144
  script_xref(name:"URL", value:"https://github.com/soheilsamanabadi/vulnerabilitys/pull/1");
@@ -1158,6 +1232,8 @@ send(socket: soc, data: triggerD);
1158
1232
  SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
1159
1233
  set_kb_item(name: "aas/detected", value: TRUE);
1160
1234
  set_kb_item(name: "aas/http/detected", value: TRUE);
1235
+ set_kb_item(name: "acronis/aci/detected", value: TRUE);
1236
+ set_kb_item(name: "acronis/aci/http/detected", value: TRUE);
1161
1237
  set_kb_item(name:"Adobe/LiveCycle/Designer", value:designVer);
1162
1238
  set_kb_item(name:"cas/commserver_ua/win/detected", value:TRUE);
1163
1239
  set_kb_item( name:"Jasig CAS server/Installed", value:TRUE );
@@ -1170,6 +1246,12 @@ set_kb_item(name:"WMI/Antivir/UptoDate", value:AntiVir_UpDate);
1170
1246
  set_mandatory_key( key:"AAS", regex:"^Server\s*:\s*AAS", banner:banner );
1171
1247
  several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic
1172
1248
  Several other fixes for pg_dump, which includ... [Please see the references for more information on the vulnerabilities]");
1249
+ SF:equest\x20that\x20this\x20server\x20could\x20not\x20understand\.</h2>\n
1250
+ SF:ot\x20found\.\",\"status\":\"404\"}\]}\n")%r(HTTPOptions,113,"HTTP/1\.0
1251
+ SF:ot\x20understand")%r(TerminalServerCookie,E1,"HTTP/1\.1\x20400\x20Bad\x
1252
+ SF:UBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\n<html><head>\n<title>50
1253
+ SF:uest\r\nDate:\x20Tue,\x2004\x20Jul\x202023\x2008:37:10\x20GMT\r\nServer
1254
+ SF:uest\x20that\x20this\x20server\x20could\x20not\x20understand\.</td></tr
1173
1255
  + Short curcuit the conditional for identifying the sysconfig renderer.
1174
1256
  SICWEB web interface accessible from a public WAN (Internet) / public LAN and with auto-logon
1175
1257
  # Siemens, SIMATIC NET, RUGGEDCOM RM1224 NAM, 6GK6 108-4AM00-2DA2, HW: Version 1, FW: Version V04.01.02, SVPH8159590
@@ -1182,6 +1264,7 @@ Simo Sorce of Red Hat discovered that the Samba client code always requests a fo
1182
1264
  smaller than the needed space to include EDE records.");
1183
1265
  - smbd: Fix file name buflen and padding in notify repsonse, (bso#10634).
1184
1266
  - Smbd: fix file name buflen and padding in notify repsonse, (bso#10634).
1267
+ smelastsys:x:2999:2999:sme last system user marker:/tmp:/bin/false
1185
1268
  sndReq = http_get(item:"/olt/Login.do", port:oatPort);
1186
1269
  sndReq = http_get(item:string(dir , "/doc/catalogue.html"), port:openPort);
1187
1270
  sndReq = http_get(item:string(dir, "/LiveTime/WebObjects/LiveTime.woa"), port:novPort);
@@ -1196,6 +1279,7 @@ solution = "mount -o remount,ro PARTITION";
1196
1279
  Soyeon Park and Wen Xu discovered a type error in the v8 javascript
1197
1280
  Soyeon Park and Wen Xu discovered memory corruption issues that
1198
1281
  Soyeon Park and Wen Xu discovered the use of a wrong type in the v8
1282
+ <span lang="it">Ore di lavoro
1199
1283
  # SPDX-FileCopyrightText: 2005 Charles Thier
1200
1284
  # SPDX-FileCopyrightText: 2005 Holm Diening / SLITE IT-Security
1201
1285
  specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switches to cause a slow
@@ -1243,6 +1327,8 @@ TCP 5637 PC Crasher
1243
1327
  TCP 5638 PC Crasher
1244
1328
  TCP 80 711 trojan (Seven Eleven), AckCmd, Back End, Back Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Executor, God Message, God Message 4 Creator, Hooker, IISworm, MTX, NCX, Noob, Ramen, Reverse WWW Tunnel Backdoor, RingZero, RTB 666, Seeker, WAN Remote, Web Server CT, WebDownloader, Mydoom, Xeory, Zombam, W32.Yaha, Ketch, Mydoom, W32.Welchia,W32.HLLW.Doomjuice, W32.HLLW.Heycheck, W32.Gaobot, W32.HLLW.Polybot, W32.Beagle, W32.Spybot, Mindos, Hexem, Eaghouse, Tabela, W32.Ifbo, W32.Pinkton, W32.Tdiserv, W32.Bobax, W32.Theals, Banito, W32.Lile, Darkmoon, Bifrose, Lodear, Civcat, Muquest, W32.Feebs, Bebshell, Hesive
1245
1329
  TCP 9871 Theef.B
1330
+ <td id="accountName"><div>Cliente Web IceWarp Básico</div></td>
1331
+ <td>Protimrazov� ochrana na zp�te�ce - p�edehrev</td>
1246
1332
  TE30, TE40, TE50, TE60, USG9500, VP9660, ViewPoint 8660, ViewPoint 9030 and eSpace U1981.");
1247
1333
  ## TE and CE affected but pattern coming like this only
1248
1334
  ##TE and CE affected but pattern coming like this only
@@ -1347,6 +1433,7 @@ to the buildd network are needed (to provide the new Rust-based toolchain
1347
1433
  transit between sites on current ACI Spine Switches hardware.");
1348
1434
  - Transport of TE related metrics over OSPF, IS-IS.
1349
1435
  triggerD = raw_string(0x06,0x00,0x07,0x00,0x20,0x00,0x00,0x00,0x0e,0x00,0x32,
1436
+ <tr><td width=15% class='defaultText'>java.util.logging.manager</td><td width=85% class='defaultText'> org.apache.juli.ClassLoaderLogManager</td></tr>
1350
1437
  Tuomas Haanpaa and Matti Kamunen from Synopsys Ltd discovered that the NFSv2 and NFSv3 server implementations are vulnerable to an out-of-bounds memory access issue while processing arbitrarily long arguments sent by NFSv2/NFSv3 PRC clients, leading to a denial of service.
1351
1438
  two intermediate CAs which could be used to generate rogue end-entity
1352
1439
  udev: Downgrade message when settting inotify watch up fails.
@@ -1355,6 +1442,7 @@ udev: Downgrade message when settting inotify watch up fails.
1355
1442
  unconstrained interal data buffering (bsc#1146097).
1356
1443
  - Undefined behavior in bounded channel of crossbeam rust crate.
1357
1444
  Unified CM and Cisco Unified CM SME could allow an authenticated, remote attacker with
1445
+ unknown operater:id;
1358
1446
  unspecified errors in GSS-API, DCERPC SPOOLSS, LDSS, DOF, SRVLOC
1359
1447
  upack packer files.");
1360
1448
  - Update anonymous access ACI to protect secret attributes (#902481)
@@ -1404,6 +1492,7 @@ using the 'Connection: TE, , Keep-Alive' header.");
1404
1492
  variable_get_set = re.search('[^#](\n[ ]*#+ ?([Vv]ulnerable [Uu][Rr][Ll]|[GgSs]et|[Ss]end[s]?( (the |a )?[Rr]equest)? [Aa]nd [Rr]eceive|[Ff]etch|[Oo]pen ([Tt]he )?(UDP|udp|TCP|tcp)? ?[Ss]ocket|[Cc]los(e|ing) ([Tt]he )?(FTP|Telnet|SSH)? ?[Ss]ocket|[Cc]heck|[Ii]terate|[Tt]ry|[Cc]onfirm|[Cc]onstruct|[Bb]uild|[Gg]rep|[Rr]egister|[Cc]onstant|[Ww]indows|[Ll]inux]|[Tt]raversal_files\(\) [Ff]unction [Rr]eturns [Dd]ictionary|[Ww]ait|[Ss]leep)[s]?(ing)?(ed)?(ation)?[^\r\n]*)', text)
1405
1493
  Vegard Nossum reported an issue with the UNIX socket garbage collector. Local users can consume all of LOWMEM and decrease system performance by overloading the system with inflight sockets.
1406
1494
  vers[1] = ereg_replace( pattern:"No UTF-8\. Trying to change locale\.\s*Locale sucessfully changed\.\s*", string:vers[1], replace:"" );
1495
+ vers = eregmatch(pattern: "IBM WebSphere Application Server( Network Deployment|\s*\-\s*ND)?\s*([0-9.]+[^ ]+)",
1407
1496
  vers = eregmatch( pattern:"mandr(iva|ake).*inux ?(enterprise server)? release ([0-9.]+)", string:rls, icase:TRUE );
1408
1497
  vers = eregmatch(pattern: ">Rev\. ([0-9.]+)([^<]+Bu(li|il)d\. ([0-9]+))?", string: res);
1409
1498
  vers = eregmatch(pattern: "(RICOH|LANIER|SAVIN|NRG) ((Aficio |Pro)?([A-Z]+)? ?[^, ]+)( JPN)?( V?([0-9.]+))?", string: sysdesc);
@@ -1418,6 +1507,7 @@ version of nd.
1418
1507
  via crafted description chunks in a CAF audio file, leading to a
1419
1508
  "vsapres/js/thirdparty",
1420
1509
  "vsapres/js/thirdparty/material",
1510
+ # V-SOL GPON OLT
1421
1511
  vulnerability by flooding an adjacent IOS XE device with specific ND messages.");
1422
1512
  vulnerability by sending crafted IPv6 Neighbor Discovery (ND) packets to an affected device for
1423
1513
  vulnerability that is described in this advisory. Customers who are using the Cisco ACI Multi-Site
@@ -1457,6 +1547,7 @@ We recommend that you upgrade your racoon package.");
1457
1547
  will execute user defined network requests to both WAN and LAN clients. A remote unauthenticated attacker can use
1458
1548
  win32k_file_id = 'oval:org.mitre.oval:obj:570';
1459
1549
  win32k_file_variable_id = 'oval:org.mitre.oval:var:200';
1550
+ window.snWebaConfig.webaScriptPath = "/scripts/piwik-3.1.1/thirdparty/piwik.min.js";
1460
1551
  winsrv_file_id = 'oval:org.mitre.oval:obj:1382';
1461
1552
  winsrv_file_variable_id = 'oval:org.mitre.oval:var:200';
1462
1553
  with an on-path position between the ACI sites could exploit this vulnerability by intercepting
@@ -32,6 +32,14 @@ IGNORE_TAGS = [
32
32
  "script_name",
33
33
  "script_xref",
34
34
  "script_add_preference",
35
+ # nb: Various variants of URLs in comments which we can't / shouldn't
36
+ # trim down
37
+ " # http://",
38
+ " # https://",
39
+ " # - http://",
40
+ " # - https://",
41
+ " # > http://",
42
+ " # > https://",
35
43
  # nb: Special cases we should ignore (at least for now) as these are
36
44
  # commonly used like this and is only two chars "too long".
37
45
  'script_tag(name:"vuldetect", value:"Checks if a vulnerable version is '
@@ -81,7 +81,7 @@ def _finalize_content(content: str) -> str:
81
81
  content_to_keep = content.split("exit(0);")[0]
82
82
  return content_to_keep + (
83
83
  'script_tag(name:"deprecated", value:TRUE);'
84
- "\n\nexit(0);\n}\n\nexit(66);\n"
84
+ "\n\n exit(0);\n}\n\nexit(66);\n"
85
85
  )
86
86
 
87
87
 
@@ -1,8 +1,7 @@
1
- Metadata-Version: 2.1
1
+ Metadata-Version: 2.3
2
2
  Name: troubadix
3
- Version: 24.10.2
3
+ Version: 25.1.1
4
4
  Summary: A linting and QA check tool for NASL files
5
- Home-page: https://github.com/greenbone/troubadix
6
5
  License: GPL-3.0-or-later
7
6
  Author: Greenbone
8
7
  Author-email: info@greenbone.net
@@ -22,9 +21,10 @@ Requires-Dist: chardet (>=4,<6)
22
21
  Requires-Dist: charset-normalizer (>=3.2.0,<4.0.0)
23
22
  Requires-Dist: codespell (>=2.0.0,<3.0.0)
24
23
  Requires-Dist: gitpython (>=3.1.31,<4.0.0)
25
- Requires-Dist: pontos (>=22.7,<25.0)
24
+ Requires-Dist: pontos (>=22.7,<26.0)
26
25
  Requires-Dist: python-magic (>=0.4.25,<0.5.0)
27
26
  Requires-Dist: validators (>=0.34.0,<0.35.0)
27
+ Project-URL: Homepage, https://github.com/greenbone/troubadix
28
28
  Project-URL: Repository, https://github.com/greenbone/troubadix
29
29
  Description-Content-Type: text/markdown
30
30
 
@@ -1,8 +1,8 @@
1
1
  troubadix/__init__.py,sha256=K7sIXXDrC7YRb7BvIpdQ6ZfG_QkT0qUH_wAlHROVRfM,716
2
- troubadix/__version__.py,sha256=58oJtkrBoJ8AceR1_OSAT2aE8w7HbsSoDvB5DNU7d64,104
2
+ troubadix/__version__.py,sha256=DlIcvh5hb66n25WeAPv-ukViUKzQ2ydLEb-sTIsNfmA,103
3
3
  troubadix/argparser.py,sha256=YAo8cGJt0k2GMICXrDj3Z124GrM8oRwgNm2Bn3J_gYI,7001
4
- troubadix/codespell/codespell.additions,sha256=OaHe66OE0Yx4VTkhIeITZqB7_ERiv0fsDnpikGUgZ-Q,488
5
- troubadix/codespell/codespell.exclude,sha256=6HEOtHrMBBdm4E4794W4g1H9nmGLlYbgZpQiJzKio-A,139033
4
+ troubadix/codespell/codespell.additions,sha256=NAYnQF79kdk4YhU_h8fpjAVVkqBm778aPHPPP7FEkZY,504
5
+ troubadix/codespell/codespell.exclude,sha256=W38XK8hoWWgLDCCJ7USj0YPhqzW68UN7va7bGA2n5eg,145449
6
6
  troubadix/codespell/codespell.ignore,sha256=jeOZuryNNiKgj_KCr4-H2ff18wlCE5jo0vTTRUk4p4Q,1367
7
7
  troubadix/helper/__init__.py,sha256=tp2fPLzwGEA_2eiJbvuePiY6rjYSFxx7VUsCV4fSwvw,1110
8
8
  troubadix/helper/helper.py,sha256=GXapYLii2rLKwkX2ok31YoAdUSizBnyPjWz-aPP6HM8,3105
@@ -36,7 +36,7 @@ troubadix/plugins/missing_desc_exit.py,sha256=GAd4FXhjX1ZEkb4hz3HqqDQVSxfuXVtuKK
36
36
  troubadix/plugins/missing_tag_solution.py,sha256=iO7_6Us3w12AVPuiGK3AUU3S62K1lcZvcGK_-fvvQtk,2828
37
37
  troubadix/plugins/multiple_re_parameters.py,sha256=9NugrcdHBmX2UO9mOuWiqxbIX1sXniZ2AhSW2pguSBE,1422
38
38
  troubadix/plugins/newlines.py,sha256=aEQOzkzd3rl9DjEi7q0EOB1M8h41WXr0O5Qf4jMFEvM,2788
39
- troubadix/plugins/overlong_description_lines.py,sha256=dF7UQ7tphkWuiXeLj4-y0zi86RumkwCCPCn2My1SIDo,3130
39
+ troubadix/plugins/overlong_description_lines.py,sha256=qBGlZpZn-WToJQhBpPMkHLvHjXpPtasvKS3PrtqtBOc,3345
40
40
  troubadix/plugins/overlong_script_tags.py,sha256=LKJQxX9s2fkExkM0MOIqYZGOKbEe9eth7DEcxFo3A8k,2356
41
41
  troubadix/plugins/prod_svc_detect_in_vulnvt.py,sha256=AnHF5jPNz4wEr-etZ2fkJNqqMH2he-9ofOdzWJyPeK4,4292
42
42
  troubadix/plugins/qod.py,sha256=OMEjZR3fbimLX4F3LsMZZn4IZi32j4soMYp1uQFv5Sc,4164
@@ -87,14 +87,14 @@ troubadix/standalone_plugins/changed_packages/marker/dropped_architecture.py,sha
87
87
  troubadix/standalone_plugins/changed_packages/marker/marker.py,sha256=7uZXR2Ds_8soB_2wugCkOSz_3hoX03KMh2NAW0G5Dzg,1278
88
88
  troubadix/standalone_plugins/changed_packages/package.py,sha256=Pcr2tcwiPTzD3jB0iteqA7-TajL-dl5Onh1dvC_H9xk,2743
89
89
  troubadix/standalone_plugins/common.py,sha256=PkScV-lisNY4WyrzwjV3dK1DF26hJv5JXTcREblJ0v0,1028
90
- troubadix/standalone_plugins/deprecate_vts.py,sha256=WjhJb9YkUp_5TScE9wKI856tfi7ZZ6mBQQdrE-BqQE0,7889
90
+ troubadix/standalone_plugins/deprecate_vts.py,sha256=iRYHA1_Uf1zRs0ExwNfo7Z6Jt6eSP4WBKwM6s2GyqeQ,7891
91
91
  troubadix/standalone_plugins/file_extensions.py,sha256=QLQt02WIc4SWLDTKKnG8q2g-atC7Mgus-opuXf_SX1A,2630
92
92
  troubadix/standalone_plugins/last_modification.py,sha256=oYzQq7xV3YzSvi6ZtuHuupXsJwBtO93tKfbwaIeqiJI,4616
93
93
  troubadix/standalone_plugins/no_solution.py,sha256=81r20kP8otRob2NTaCea-sgVRIM6ARvhddFdibsG6Ao,8877
94
94
  troubadix/standalone_plugins/version_updated.py,sha256=RlzVuXgFOvcjrRTOhiTYlmzV4vvcn7ntCz0lDTjePMU,4316
95
95
  troubadix/troubadix.py,sha256=foA7Loi67cCKieN3ea4s3QOfOWOkgwQVR1H-pNXtXn0,6041
96
- troubadix-24.10.2.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
97
- troubadix-24.10.2.dist-info/METADATA,sha256=JBx0oG22hQqU9IWcXGRPHDMkF5oFRPKh90J_pmUy4u0,4417
98
- troubadix-24.10.2.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
99
- troubadix-24.10.2.dist-info/entry_points.txt,sha256=LplOk4nzKrS4B8Jz0SPkQLPlIDesdraCO8Vp_eoycpc,737
100
- troubadix-24.10.2.dist-info/RECORD,,
96
+ troubadix-25.1.1.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
97
+ troubadix-25.1.1.dist-info/METADATA,sha256=QrKxF8_69qhBPqo_6gyedojFqM7f7DTWgRznQFIqYn8,4428
98
+ troubadix-25.1.1.dist-info/WHEEL,sha256=IYZQI976HJqqOpQU6PHkJ8fb3tMNBFjg-Cn-pwAbaFM,88
99
+ troubadix-25.1.1.dist-info/entry_points.txt,sha256=LplOk4nzKrS4B8Jz0SPkQLPlIDesdraCO8Vp_eoycpc,737
100
+ troubadix-25.1.1.dist-info/RECORD,,
@@ -1,4 +1,4 @@
1
1
  Wheel-Version: 1.0
2
- Generator: poetry-core 1.9.1
2
+ Generator: poetry-core 2.0.1
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any