Mercurial > farol > farolluz
changeset 54:6c320c3f3176
Fix the tests
author | Benoît Allard <benoit.allard@greenbone.net> |
---|---|
date | Wed, 07 Jan 2015 11:56:41 +0100 |
parents | 91831a9f8aa1 |
children | 7653ffbec88b |
files | tests/testParseCVE.py |
diffstat | 1 files changed, 2 insertions(+), 6 deletions(-) [+] |
line wrap: on
line diff
--- a/tests/testParseCVE.py Mon Jan 05 12:34:33 2015 +0100 +++ b/tests/testParseCVE.py Wed Jan 07 11:56:41 2015 +0100 @@ -10,9 +10,7 @@ </cpe-lang:logical-test> </vuln:vulnerable-configuration> <vuln:vulnerable-software-list> -<vuln:product> -cpe:/a:jdm_lifestyle_project:jdm_lifestyle:6.4::~~~android~~ -</vuln:product> +<vuln:product>cpe:/a:jdm_lifestyle_project:jdm_lifestyle:6.4::~~~android~~</vuln:product> </vuln:vulnerable-software-list> <vuln:cve-id>CVE-2014-7088</vuln:cve-id> <vuln:published-datetime>2014-10-18T21:55:17.027-04:00</vuln:published-datetime> @@ -37,9 +35,7 @@ </vuln:references> <vuln:references reference_type="UNKNOWN" xml:lang="en"> <vuln:source>MISC</vuln:source> -<vuln:reference href="https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" xml:lang="en"> -https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing -</vuln:reference> +<vuln:reference href="https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" xml:lang="en">https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing</vuln:reference> </vuln:references> <vuln:summary> The JDM Lifestyle (aka com.hondatech) application 6.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.