troubadix 25.3.5__py3-none-any.whl → 25.4.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- troubadix/__version__.py +1 -1
- troubadix/codespell/codespell.additions +2 -0
- troubadix/codespell/codespell.exclude +2 -0
- troubadix/plugins/grammar.py +5 -0
- {troubadix-25.3.5.dist-info → troubadix-25.4.0.dist-info}/METADATA +1 -1
- {troubadix-25.3.5.dist-info → troubadix-25.4.0.dist-info}/RECORD +9 -9
- {troubadix-25.3.5.dist-info → troubadix-25.4.0.dist-info}/LICENSE +0 -0
- {troubadix-25.3.5.dist-info → troubadix-25.4.0.dist-info}/WHEEL +0 -0
- {troubadix-25.3.5.dist-info → troubadix-25.4.0.dist-info}/entry_points.txt +0 -0
troubadix/__version__.py
CHANGED
|
@@ -815,6 +815,8 @@ ofproto/bond: fix interal flow leak of tcp-balance bond
|
|
|
815
815
|
of user-supplied input processed by Steam In-Home Streaming (IHS) Discovery
|
|
816
816
|
of Wiesemann & Theis GmbH W&T OPC Server for Windows.");
|
|
817
817
|
Ohter bug fixes:
|
|
818
|
+
"olt",
|
|
819
|
+
"olt/pages",
|
|
818
820
|
# on e.g. newer releases of the NAM appliance we're even getting an 403/forbidden
|
|
819
821
|
opc_req_header = raw_string("HEL", # Message Type (Hello)
|
|
820
822
|
opening a specially crafted CAF audio file, an attacker could execute
|
troubadix/plugins/grammar.py
CHANGED
|
@@ -174,6 +174,11 @@ def get_grammer_pattern() -> re.Pattern:
|
|
|
174
174
|
# server-site template injection -> server-side template injection
|
|
175
175
|
r"cross[\s-]+side[\s-]+(request[\s-]+forgery|scripting)|"
|
|
176
176
|
r"server[\s-]+site[\s-]+(request[\s-]+forgery|template)[\s-]+injection|"
|
|
177
|
+
# nb: Next two could happen when copy'n'paste some text parts around
|
|
178
|
+
# like e.g.:
|
|
179
|
+
# is prone to a to a remote denial-of-service vulnerability
|
|
180
|
+
# CVE-2022-31702: Command injection in the in the vRNI REST API
|
|
181
|
+
r"in the in the|to an? to a|"
|
|
177
182
|
# e.g. "is prone to a security bypass vulnerabilities"
|
|
178
183
|
r"is\s+prone\s+to\s+an?\s+[^\s]+\s+([^\s]+\s+)?vulnerabilities" r").*",
|
|
179
184
|
re.IGNORECASE,
|
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
troubadix/__init__.py,sha256=K7sIXXDrC7YRb7BvIpdQ6ZfG_QkT0qUH_wAlHROVRfM,716
|
|
2
|
-
troubadix/__version__.py,sha256=
|
|
2
|
+
troubadix/__version__.py,sha256=tBwIKM3lj8Q-OeDPH_A20MFR1-rIB7BcVcpYNmTniHU,103
|
|
3
3
|
troubadix/argparser.py,sha256=-H07Jhqh68_M4Mbjq9qJjTr3MShy_N2pxl2qHA6cfRU,7481
|
|
4
|
-
troubadix/codespell/codespell.additions,sha256=
|
|
5
|
-
troubadix/codespell/codespell.exclude,sha256=
|
|
4
|
+
troubadix/codespell/codespell.additions,sha256=E62zoHJavUhcbMoyBqO2rOUe3OqIXikh7uAiGmNs5uw,524
|
|
5
|
+
troubadix/codespell/codespell.exclude,sha256=8blBv8KRrKU4KQhneHOPth1tSCYdrEoOCI5kYRfhOEA,147451
|
|
6
6
|
troubadix/codespell/codespell.ignore,sha256=2CP8u6O2VENcDpt2FfEDNmfa1Eh3D80yeYHT54GM1X4,1512
|
|
7
7
|
troubadix/helper/__init__.py,sha256=tp2fPLzwGEA_2eiJbvuePiY6rjYSFxx7VUsCV4fSwvw,1110
|
|
8
8
|
troubadix/helper/helper.py,sha256=GXapYLii2rLKwkX2ok31YoAdUSizBnyPjWz-aPP6HM8,3105
|
|
@@ -26,7 +26,7 @@ troubadix/plugins/duplicated_script_tags.py,sha256=UPBR2jbU15JLKJlVk1e2GFREH5Wj5
|
|
|
26
26
|
troubadix/plugins/encoding.py,sha256=zNzqNpP39TUwOklnc8OJ3OIUelAN_hvnuBYoa3Pz764,2104
|
|
27
27
|
troubadix/plugins/forking_nasl_functions.py,sha256=pYUebqPBWuqfLmnRYJgpGnrmx4YbnKIiRG8cmsIgmq4,6014
|
|
28
28
|
troubadix/plugins/get_kb_on_services.py,sha256=oFmcjiF7ZD3x5tEbJEoZNn80y1qUzNgeSZNsogSqaZ0,3401
|
|
29
|
-
troubadix/plugins/grammar.py,sha256=
|
|
29
|
+
troubadix/plugins/grammar.py,sha256=iEDFtQX-t1oLFeXiOTHM0NBHeY3X9WZrp1SNZPQT8vw,9411
|
|
30
30
|
troubadix/plugins/http_links_in_tags.py,sha256=yKT5SgLo__TJKAfudfIHkoMF0g9VtOP4VI77dANj014,7221
|
|
31
31
|
troubadix/plugins/illegal_characters.py,sha256=B6q_RU85AxCjLry56Oc-RhMSpnJU8mTrxclRzi1FVFU,4406
|
|
32
32
|
troubadix/plugins/log_messages.py,sha256=COrnp3bXMG8PRIAD2x5Ka9hk-jI16We9ifXj6JBZI0c,2960
|
|
@@ -98,8 +98,8 @@ troubadix/standalone_plugins/last_modification.py,sha256=ROzwVzzYilXJ0llVt4Lv0w8
|
|
|
98
98
|
troubadix/standalone_plugins/no_solution.py,sha256=p_-az9Igl4GH6HnhLLYbYlWIiEP64OTQLpX-z3JAshs,8760
|
|
99
99
|
troubadix/standalone_plugins/version_updated.py,sha256=6YHF0OjL5NWszQdsSh7XzlSji1e6Uaqwu_Y6m3R0mvI,4203
|
|
100
100
|
troubadix/troubadix.py,sha256=5__Jz3bYSrya4aG6RCBWxqnsDepXfwXZ3v0bjCzEFi0,6039
|
|
101
|
-
troubadix-25.
|
|
102
|
-
troubadix-25.
|
|
103
|
-
troubadix-25.
|
|
104
|
-
troubadix-25.
|
|
105
|
-
troubadix-25.
|
|
101
|
+
troubadix-25.4.0.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
|
|
102
|
+
troubadix-25.4.0.dist-info/METADATA,sha256=OGl9HWxYNgk0wTFIU5q5Q2Z6uf4VGcfg-YfSpQT87zo,4462
|
|
103
|
+
troubadix-25.4.0.dist-info/WHEEL,sha256=fGIA9gx4Qxk2KDKeNJCbOEwSrmLtjWCwzBz351GyrPQ,88
|
|
104
|
+
troubadix-25.4.0.dist-info/entry_points.txt,sha256=SnhEUe4W76P-ADmO9J355gRztTyHU_PTxRewKy3-e5o,832
|
|
105
|
+
troubadix-25.4.0.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|