# HG changeset patch # User BenoƮt Allard # Date 1420628201 -3600 # Node ID 6c320c3f3176ec4f52e3b6208f89a29466be79d6 # Parent 91831a9f8aa199460c758d813ede5577dc7988ef Fix the tests diff -r 91831a9f8aa1 -r 6c320c3f3176 tests/testParseCVE.py --- a/tests/testParseCVE.py Mon Jan 05 12:34:33 2015 +0100 +++ b/tests/testParseCVE.py Wed Jan 07 11:56:41 2015 +0100 @@ -10,9 +10,7 @@ - -cpe:/a:jdm_lifestyle_project:jdm_lifestyle:6.4::~~~android~~ - +cpe:/a:jdm_lifestyle_project:jdm_lifestyle:6.4::~~~android~~ CVE-2014-7088 2014-10-18T21:55:17.027-04:00 @@ -37,9 +35,7 @@ MISC - -https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - +https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing The JDM Lifestyle (aka com.hondatech) application 6.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.