dawnscanner 1.6.1 → 1.6.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (124) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/.ruby-version +1 -1
  5. data/.travis.yml +2 -0
  6. data/Changelog.md +10 -1
  7. data/KnowledgeBase.md +10 -4
  8. data/README.md +1 -1
  9. data/Rakefile +12 -8
  10. data/VERSION +1 -1
  11. data/checksum/dawnscanner-1.6.1.gem.sha1 +1 -0
  12. data/lib/dawn/kb/cve_2016_2097.rb +35 -0
  13. data/lib/dawn/kb/cve_2016_2098.rb +34 -0
  14. data/lib/dawn/knowledge_base.rb +4 -0
  15. data/lib/dawn/version.rb +4 -4
  16. data/spec/lib/dawn/codesake_core_spec.rb +1 -1
  17. data/spec/lib/dawn/codesake_knowledgebase_spec.rb +451 -441
  18. data/spec/lib/dawn/codesake_padrino_engine_disabled.rb +11 -11
  19. data/spec/lib/dawn/codesake_rails_engine_disabled.rb +2 -2
  20. data/spec/lib/dawn/codesake_sinatra_engine_disabled.rb +36 -36
  21. data/spec/lib/kb/codesake_cve_2013_0175_spec.rb +6 -6
  22. data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +7 -7
  23. data/spec/lib/kb/codesake_dependency_version_check_spec.rb +10 -10
  24. data/spec/lib/kb/codesake_deprecation_check_spec.rb +11 -11
  25. data/spec/lib/kb/codesake_ruby_version_check_spec.rb +4 -4
  26. data/spec/lib/kb/codesake_version_check_spec.rb +42 -42
  27. data/spec/lib/kb/cve_2011_2705_spec.rb +7 -7
  28. data/spec/lib/kb/cve_2011_2930_spec.rb +6 -6
  29. data/spec/lib/kb/cve_2011_3009_spec.rb +4 -4
  30. data/spec/lib/kb/cve_2011_3187_spec.rb +4 -4
  31. data/spec/lib/kb/cve_2011_4319_spec.rb +9 -9
  32. data/spec/lib/kb/cve_2011_5036_spec.rb +21 -21
  33. data/spec/lib/kb/cve_2012_1098_spec.rb +7 -7
  34. data/spec/lib/kb/cve_2012_2139_spec.rb +3 -3
  35. data/spec/lib/kb/cve_2012_2671_spec.rb +4 -4
  36. data/spec/lib/kb/cve_2012_6109_spec.rb +25 -25
  37. data/spec/lib/kb/cve_2012_6684_spec.rb +2 -2
  38. data/spec/lib/kb/cve_2013_0162_spec.rb +4 -4
  39. data/spec/lib/kb/cve_2013_0183_spec.rb +11 -11
  40. data/spec/lib/kb/cve_2013_0184_spec.rb +26 -26
  41. data/spec/lib/kb/cve_2013_0256_spec.rb +6 -6
  42. data/spec/lib/kb/cve_2013_0262_spec.rb +9 -9
  43. data/spec/lib/kb/cve_2013_0263_spec.rb +1 -1
  44. data/spec/lib/kb/cve_2013_1607_spec.rb +2 -2
  45. data/spec/lib/kb/cve_2013_1655_spec.rb +4 -4
  46. data/spec/lib/kb/cve_2013_1756_spec.rb +4 -4
  47. data/spec/lib/kb/cve_2013_2090_spec.rb +2 -2
  48. data/spec/lib/kb/cve_2013_2105_spec.rb +1 -1
  49. data/spec/lib/kb/cve_2013_2119_spec.rb +5 -5
  50. data/spec/lib/kb/cve_2013_2512_spec.rb +2 -2
  51. data/spec/lib/kb/cve_2013_2513_spec.rb +2 -2
  52. data/spec/lib/kb/cve_2013_2516_spec.rb +2 -2
  53. data/spec/lib/kb/cve_2013_4203_spec.rb +2 -2
  54. data/spec/lib/kb/cve_2013_4413_spec.rb +2 -2
  55. data/spec/lib/kb/cve_2013_4489_spec.rb +11 -11
  56. data/spec/lib/kb/cve_2013_4491_spec.rb +2 -2
  57. data/spec/lib/kb/cve_2013_4593_spec.rb +2 -2
  58. data/spec/lib/kb/cve_2013_5647_spec.rb +3 -3
  59. data/spec/lib/kb/cve_2013_5671_spec.rb +4 -4
  60. data/spec/lib/kb/cve_2013_6416_spec.rb +5 -5
  61. data/spec/lib/kb/cve_2013_6459_spec.rb +2 -2
  62. data/spec/lib/kb/cve_2013_7086_spec.rb +3 -3
  63. data/spec/lib/kb/cve_2014_0036_spec.rb +2 -2
  64. data/spec/lib/kb/cve_2014_0080_spec.rb +5 -5
  65. data/spec/lib/kb/cve_2014_0081_spec.rb +10 -10
  66. data/spec/lib/kb/cve_2014_0082_spec.rb +8 -8
  67. data/spec/lib/kb/cve_2014_0130_spec.rb +3 -3
  68. data/spec/lib/kb/cve_2014_1233_spec.rb +2 -2
  69. data/spec/lib/kb/cve_2014_1234_spec.rb +2 -2
  70. data/spec/lib/kb/cve_2014_2322_spec.rb +2 -2
  71. data/spec/lib/kb/cve_2014_2538_spec.rb +2 -2
  72. data/spec/lib/kb/cve_2014_3482_spec.rb +2 -2
  73. data/spec/lib/kb/cve_2014_3483_spec.rb +5 -5
  74. data/spec/lib/kb/cve_2014_7818_spec.rb +8 -8
  75. data/spec/lib/kb/cve_2014_7819_spec.rb +32 -32
  76. data/spec/lib/kb/cve_2014_7829_spec.rb +10 -10
  77. data/spec/lib/kb/cve_2014_9490_spec.rb +2 -2
  78. data/spec/lib/kb/cve_2015_1819_spec.rb +2 -2
  79. data/spec/lib/kb/cve_2015_1840_spec.rb +7 -7
  80. data/spec/lib/kb/cve_2015_2963_spec.rb +2 -2
  81. data/spec/lib/kb/cve_2015_3224_spec.rb +2 -2
  82. data/spec/lib/kb/cve_2015_3225_spec.rb +5 -5
  83. data/spec/lib/kb/cve_2015_3226_spec.rb +6 -6
  84. data/spec/lib/kb/cve_2015_3227_spec.rb +5 -5
  85. data/spec/lib/kb/cve_2015_3448_spec.rb +2 -2
  86. data/spec/lib/kb/cve_2015_4020_spec.rb +4 -4
  87. data/spec/lib/kb/cve_2015_5312_spec.rb +6 -6
  88. data/spec/lib/kb/cve_2015_7497_spec.rb +6 -6
  89. data/spec/lib/kb/cve_2015_7498_spec.rb +6 -6
  90. data/spec/lib/kb/cve_2015_7499_spec.rb +6 -6
  91. data/spec/lib/kb/cve_2015_7500_spec.rb +6 -6
  92. data/spec/lib/kb/cve_2015_7519_spec.rb +4 -4
  93. data/spec/lib/kb/cve_2015_7541_spec.rb +2 -2
  94. data/spec/lib/kb/cve_2015_7576_spec.rb +11 -11
  95. data/spec/lib/kb/cve_2015_7577_spec.rb +11 -11
  96. data/spec/lib/kb/cve_2015_7578_spec.rb +2 -2
  97. data/spec/lib/kb/cve_2015_7579_spec.rb +4 -4
  98. data/spec/lib/kb/cve_2015_7581_spec.rb +11 -11
  99. data/spec/lib/kb/cve_2015_8241_spec.rb +6 -6
  100. data/spec/lib/kb/cve_2015_8242_spec.rb +6 -6
  101. data/spec/lib/kb/cve_2015_8317_spec.rb +6 -6
  102. data/spec/lib/kb/cve_2016_0751_spec.rb +11 -11
  103. data/spec/lib/kb/cve_2016_0752_spec.rb +11 -11
  104. data/spec/lib/kb/cve_2016_0753_spec.rb +11 -11
  105. data/spec/lib/kb/cve_2016_2097_spec.rb +35 -0
  106. data/spec/lib/kb/cve_2016_2098_spec.rb +39 -0
  107. data/spec/lib/kb/osvdb_105971_spec.rb +2 -2
  108. data/spec/lib/kb/osvdb_108530_spec.rb +3 -3
  109. data/spec/lib/kb/osvdb_108563_spec.rb +2 -2
  110. data/spec/lib/kb/osvdb_108569_spec.rb +2 -2
  111. data/spec/lib/kb/osvdb_108570_spec.rb +2 -2
  112. data/spec/lib/kb/osvdb_115654_spec.rb +2 -2
  113. data/spec/lib/kb/osvdb_116010_spec.rb +2 -2
  114. data/spec/lib/kb/osvdb_117903_spec.rb +4 -4
  115. data/spec/lib/kb/osvdb_118830_spec.rb +2 -2
  116. data/spec/lib/kb/osvdb_118954_spec.rb +3 -3
  117. data/spec/lib/kb/osvdb_119878_spec.rb +21 -21
  118. data/spec/lib/kb/osvdb_119927_spec.rb +2 -2
  119. data/spec/lib/kb/osvdb_120415_spec.rb +2 -2
  120. data/spec/lib/kb/osvdb_120857_spec.rb +6 -6
  121. data/spec/lib/kb/osvdb_121701_spec.rb +2 -2
  122. data/spec/lib/kb/owasp_ror_cheatsheet_disabled.rb +10 -10
  123. metadata +9 -2
  124. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 5740023a35a5d8e109e8b6dd5b973f2e82e7285d
4
- data.tar.gz: 2cebe55d93ff7dd1b41590dd45edbbe8567e8cc6
3
+ metadata.gz: 970e93679f0ac361a19a2e761c8918f91b80686e
4
+ data.tar.gz: 8ad5519fc5d4ad77eb1d3d771756a9116cede2a0
5
5
  SHA512:
6
- metadata.gz: cae38046b407a09d88603392b4a20119a5313bfa4ea39c1891db46a3d80ee78e083fb46092118372596d49761df7d16d6d520dbae13cba9a5a77da3cc08e1765
7
- data.tar.gz: 3acfb88214793e28aac716694c783e42fb8f2c0b385d2e69041ccd13bc1c70244450bc3dfeabaffe833373de6d755c7b3db9144e0a3cc9b87b8fb10915260282
6
+ metadata.gz: 1aad748210b7509d5a13cf0c84eb82054bdf6cb54fed4775613de32a202acc2107f612f2b6e05b85e92269887883daadb7ace0676862c117f5170a4a953012b2
7
+ data.tar.gz: 46d1200055f2f5db08aa2bcc1e8a211a5025ff6c907f87568360696031c761589deef850b38388651d6fd1b6df3749c9604d79bbe35b8fbdfbd2f66103868c48
Binary file
data.tar.gz.sig CHANGED
Binary file
@@ -1 +1 @@
1
- 2.2.2
1
+ 2.3.0
@@ -13,3 +13,5 @@ notifications:
13
13
  on_success: change # options: [always|never|change] default: always
14
14
  on_failure: always # options: [always|never|change] default: always
15
15
  on_start: never # options: [always|never|change] default: always
16
+ cache: bundler
17
+ sudo: false
@@ -5,7 +5,16 @@ It supports [Sinatra](http://www.sinatrarb.com),
5
5
  [Padrino](http://www.padrinorb.com) and [Ruby on Rails](http://rubyonrails.org)
6
6
  frameworks.
7
7
 
8
- _latest update: Wed Feb 24 10:15:17 CET 2016_
8
+ _latest update: Tue Mar 1 23:11:10 CET 2016_
9
+
10
+ ## Version 1.6.2 - codename: Tow Mater (2016-03-02)
11
+
12
+ * Issue #194 - Adding a check for CVE-2016-2098: Possible remote code execution
13
+ vulnerability in Action Pack
14
+ * Issue #193 - Adding a check for CVE-2016-2097: Possible Information Leak
15
+ Vulnerability in Action View
16
+ * Issue #192 - Applying PULL REQUEST from @jasnow about RSPEC deprecation
17
+ warning fix.
9
18
 
10
19
  ## Version 1.6.1 - codename: Tow Mater (2016-02-24)
11
20
 
@@ -1,6 +1,6 @@
1
1
  # Dawnscanner Knowledge base
2
2
 
3
- The knowledge base library for dawnscanner version 1.6.0 contains 227 security checks.
3
+ The knowledge base library for dawnscanner version 1.6.2 contains 229 security checks.
4
4
  ---
5
5
  * Simple Form XSS - 20131129: There is a XSS vulnerability on Simple Form's label, hint and error options. When Simple Form creates a label, hint or error message it marks the text as being HTML safe, even though it may contain HTML tags. In applications where the text of these helpers can be provided by the users, malicious values can be provided and Simple Form will mark it as safe.
6
6
  * [CVE-2004-0755](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0755): The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions.
@@ -413,6 +413,12 @@ XML documents with carefully crafted entity expansion strings which can cause th
413
413
  * CVE-2016-0752: There is a possible directory traversal and information leak vulnerability in Action View. Applications that pass unverified user input to the render method in a controller may be vulnerable to an information leak vulnerability.
414
414
  * [CVE-2016-0753](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0753): There is a possible input validation circumvention vulnerability in Active Model. Code that uses Active Model based models (including Active Record models) and does not validate user input before passing it to the model can be subject to an attack where specially crafted input will cause the model to skip validations.
415
415
  * CVE-2016-0753: There is a possible input validation circumvention vulnerability in Active Model. Code that uses Active Model based models (including Active Record models) and does not validate user input before passing it to the model can be subject to an attack where specially crafted input will cause the model to skip validations.
416
+ * [CVE-2016-2097](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2097): Possible Information Leak Vulnerability in Action View. There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all the scenarios.
417
+ * CVE-2016-2097: Possible Information Leak Vulnerability in Action View. There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all the scenarios.
418
+ * [CVE-2016-2098](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2098): There is a possible remote code execution vulnerability in Action Pack. Applications that pass unverified user input to the render method in a
419
+ controller or a view may be vulnerable to a code injection.
420
+ * CVE-2016-2098: There is a possible remote code execution vulnerability in Action Pack. Applications that pass unverified user input to the render method in a
421
+ controller or a view may be vulnerable to a code injection.
416
422
  * [OSVDB-105971](http://osvdb.org/show/osvdb/105971): sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body] input is not properly sanitized when handling module names with shell metacharacters. This may allow a context-dependent attacker to execute arbitrary commands.
417
423
  * OSVDB-105971: sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body] input is not properly sanitized when handling module names with shell metacharacters. This may allow a context-dependent attacker to execute arbitrary commands.
418
424
  * [OSVDB-108569](http://osvdb.org/show/osvdb/108569): backup_checksum Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb that is triggered as the program displays password information in plaintext in the process list. This may allow a local attacker to gain access to password information.
@@ -435,8 +441,8 @@ XML documents with carefully crafted entity expansion strings which can cause th
435
441
  * OSVDB_118830: Doorkeeper Gem for Ruby contains a flaw in lib/doorkeeper/engine.rb. The issue is due to the program storing sensitive information in production logs. This may allow a local attacker to gain access to sensitive information.
436
442
  * [OSVDB_118954](http://osvdb.org/show/osvdb/118954): Ruby on Rails contains a flaw that is triggered when handling a to_json call to ActiveModel::Name, which can cause an infinite loop. This may allow a remote attacker to cause a denial of service.
437
443
  * OSVDB_118954: Ruby on Rails contains a flaw that is triggered when handling a to_json call to ActiveModel::Name, which can cause an infinite loop. This may allow a remote attacker to cause a denial of service.
438
- * [OSVDB_119878](http://osvdb.org/show/osvdb/119878): ret-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked.
439
- * OSVDB_119878: ret-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked.
444
+ * [OSVDB_119878](http://osvdb.org/show/osvdb/119878): rest-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked.
445
+ * OSVDB_119878: rest-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked.
440
446
  * [OSVDB_119927](http://osvdb.org/show/osvdb/119927): http Gem for Ruby contains a flaw related to certificate validation. The issue is due to a failure to call the OpenSSL::SSL::SSLSocket#post_connection_check method, leading to hostnames not being properly verified. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.
441
447
  * OSVDB_119927: http Gem for Ruby contains a flaw related to certificate validation. The issue is due to a failure to call the OpenSSL::SSL::SSLSocket#post_connection_check method, leading to hostnames not being properly verified. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.
442
448
  * [OSVDB_120415](http://osvdb.org/show/osvdb/120415): redcarpet gem for Ruby contains a flaw that allows a cross-site scripting (XSS) attack. This flaw exists because the parse_inline() function in markdown.c does not validate input before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
@@ -473,4 +479,4 @@ Setting this to true will essentially strip out any host information.
473
479
  This check will analyze the source code looking for the following patterns: XXX, TO_CHECK, CHECKME, CHECK and FIXME
474
480
 
475
481
 
476
- _Last updated: Wed 03 Feb 10:57:52 CET 2016_
482
+ _Last updated: Tue 01 Mar 23:13:46 CET 2016_
data/README.md CHANGED
@@ -24,7 +24,7 @@ box:
24
24
 
25
25
  ---
26
26
 
27
- dawnscanner version 1.6.1 has 227 security checks loaded in its knowledge
27
+ dawnscanner version 1.6.2 has 229 security checks loaded in its knowledge
28
28
  base. Most of them are CVE bulletins applying to gems or the ruby interpreter
29
29
  itself. There are also some check coming from Owasp Ruby on Rails cheatsheet.
30
30
 
data/Rakefile CHANGED
@@ -96,6 +96,8 @@ task :cve, :name do |t,args|
96
96
  file.puts "\t\t\t\t# include RubyVersionCheck"
97
97
  file.puts ""
98
98
  file.puts "\t\t\t\tdef initialize"
99
+ file.puts "\t\t\t\t\ttitle = \"\""
100
+ file.puts "\t\t\t\t\tmessage = \"\""
99
101
  file.puts "\t\t\t\tend"
100
102
  file.puts "\t\t\tend"
101
103
  file.puts "\t\tend"
@@ -113,11 +115,11 @@ task :cve, :name do |t,args|
113
115
  file.puts "\tend"
114
116
  file.puts "\tit \"is reported when the vulnerable gem is detected\" do"
115
117
  file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
116
- file.puts "\t\t@check.vuln?.should == true"
118
+ file.puts "\t\texpect(@check.vuln?).to eq(true)"
117
119
  file.puts "\tend"
118
120
  file.puts "\tit \"is not reported when a fixed release is detected\" do"
119
121
  file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
120
- file.puts "\t\t@check.vuln?.should == false"
122
+ file.puts "\t\texpect(@check.vuln?).to eq(false)"
121
123
  file.puts "\tend"
122
124
  file.puts "end"
123
125
  end
@@ -128,8 +130,8 @@ task :cve, :name do |t,args|
128
130
  puts "require \"dawn/kb/#{class_name.downcase}\""
129
131
  puts "it \"must have test for #{name}\" do"
130
132
  puts " sc = kb.find(\"#{name}\")"
131
- puts " sc.should_not be_nil"
132
- puts " sc.class.should == Dawn::Kb::#{class_name}"
133
+ puts " expect(sc).not_to be_nil"
134
+ puts " expect(sc.class).to eq(Dawn::Kb::#{class_name})"
133
135
  puts "end"
134
136
 
135
137
 
@@ -165,6 +167,8 @@ task :osvdb, :name do |t,args|
165
167
  file.puts "\t\t\t\t# include RubyVersionCheck"
166
168
  file.puts ""
167
169
  file.puts "\t\t\t\tdef initialize"
170
+ file.puts "\t\t\t\t\ttitle = \"\""
171
+ file.puts "\t\t\t\t\tmessage = \"\""
168
172
  file.puts "\t\t\t\tend"
169
173
  file.puts "\t\t\tend"
170
174
  file.puts "\t\tend"
@@ -182,11 +186,11 @@ task :osvdb, :name do |t,args|
182
186
  file.puts "\tend"
183
187
  file.puts "\tit \"is reported when the vulnerable gem is detected\" do"
184
188
  file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
185
- file.puts "\t\t@check.vuln?.should == true"
189
+ file.puts "\t\texpect(@check.vuln?).to eq(true)"
186
190
  file.puts "\tend"
187
191
  file.puts "\tit \"is not reported when a fixed release is detected\" do"
188
192
  file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
189
- file.puts "\t\t@check.vuln?.should == false"
193
+ file.puts "\t\texpect(@check.vuln?).to eq(false)"
190
194
  file.puts "\tend"
191
195
  file.puts "end"
192
196
  end
@@ -198,8 +202,8 @@ task :osvdb, :name do |t,args|
198
202
  puts "require \"dawn/kb/#{class_name.downcase}\""
199
203
  puts "it \"must have test for #{name}\" do"
200
204
  puts " sc = kb.find(\"#{name}\")"
201
- puts " sc.should_not be_nil"
202
- puts " sc.class.should == Dawn::Kb::#{class_name}"
205
+ puts " expect(sc).not_to be_nil"
206
+ puts " expect(sc.class).to eq(Dawn::Kb::#{class_name})"
203
207
  puts "end"
204
208
 
205
209
  end
data/VERSION CHANGED
@@ -12,4 +12,4 @@
12
12
  # | "Guido" | x.x.0 |
13
13
  # | "Luigi" | x.x.0 |
14
14
  # | "Doc Hudson" | x.x.0 |
15
- 1.6.1 - Tow Mater
15
+ 1.6.2 - Tow Mater
@@ -0,0 +1 @@
1
+ 61d2f6fed05b1603409cfdff4960482740bb0b0b
@@ -0,0 +1,35 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2016-03-01
4
+ class CVE_2016_2097
5
+ # Include the testing skeleton for this CVE
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message = "Possible Information Leak Vulnerability in Action View. There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all the scenarios."
12
+ title = "Possible Information Leak Vulnerability in Action View"
13
+ super({
14
+ :title=>title,
15
+ :name=> "CVE-2016-2097",
16
+ :cve=>"2016-2097",
17
+ :osvdb=>"",
18
+ :cvss=>"",
19
+ :release_date => Date.new(2016, 2, 29),
20
+ :cwe=>"",
21
+ :owasp=>"A9",
22
+ :applies=>["rails", "sinatra", "padrino"],
23
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
24
+ :message=>message,
25
+ :mitigation=>"Please upgrade actionview gem to version 3.2.22.2, 4.1.14.2 or later.",
26
+ :aux_links=>[]
27
+ })
28
+ self.safe_dependencies = [{:name=>"actionview", :version=>['3.2.22.2', '4.0.99', '4.1.14.2', '5.0.0']}]
29
+ self.save_minor = true
30
+ self.save_major = true
31
+
32
+ end
33
+ end
34
+ end
35
+ end
@@ -0,0 +1,34 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2016-03-01
4
+ class CVE_2016_2098
5
+ # Include the testing skeleton for this CVE
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message = "There is a possible remote code execution vulnerability in Action Pack. Applications that pass unverified user input to the render method in a
12
+ controller or a view may be vulnerable to a code injection."
13
+ title = "Possible remote code execution vulnerability in Action Pack"
14
+ super({
15
+ :title=>title,
16
+ :name=> "CVE-2016-2098",
17
+ :cve=>"2016-2098",
18
+ :osvdb=>"",
19
+ :cvss=>"",
20
+ :release_date => Date.new(2016, 2, 29),
21
+ :cwe=>"",
22
+ :owasp=>"A9",
23
+ :applies=>["rails", "sinatra", "padrino"],
24
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
25
+ :message=>message,
26
+ :mitigation=>"Please upgrade actionpack gem to version 3.2.22.2, 4.1.14.2, 4.2.5.2, 5.0.0 or later.",
27
+ :aux_links=>[]
28
+ })
29
+ self.safe_dependencies = [{:name=>"actionpack", :version=>['3.2.22.2', '4.1.14.2', '4.2.5.2', '5.0.0']}]
30
+
31
+ end
32
+ end
33
+ end
34
+ end
@@ -264,6 +264,8 @@ require "dawn/kb/cve_2015_8317"
264
264
  require "dawn/kb/cve_2016_0751"
265
265
  require "dawn/kb/cve_2016_0752"
266
266
  require "dawn/kb/cve_2016_0753"
267
+ require "dawn/kb/cve_2016_2097"
268
+ require "dawn/kb/cve_2016_2098"
267
269
 
268
270
  # OSVDB
269
271
 
@@ -563,6 +565,8 @@ module Dawn
563
565
  Dawn::Kb::CVE_2016_0751.new,
564
566
  Dawn::Kb::CVE_2016_0752.new,
565
567
  Dawn::Kb::CVE_2016_0753.new,
568
+ Dawn::Kb::CVE_2016_2097.new,
569
+ Dawn::Kb::CVE_2016_2098.new,
566
570
 
567
571
 
568
572
  # OSVDB Checks are still here since are all about dependencies
@@ -1,7 +1,7 @@
1
1
  module Dawn
2
- VERSION = "1.6.1"
2
+ VERSION = "1.6.2"
3
3
  CODENAME = "Tow Mater"
4
- RELEASE = "20160224"
5
- BUILD = "8"
6
- COMMIT = "g3e4217f"
4
+ RELEASE = "20160301"
5
+ BUILD = "9"
6
+ COMMIT = "gc67c5bf"
7
7
  end
@@ -3,7 +3,7 @@ require 'spec_helper'
3
3
  describe "The Core" do
4
4
  describe "#find_conf" do
5
5
  it "returns path name if true passed" do
6
- Dawn::Core.find_conf(true).should_not be_nil
6
+ expect(Dawn::Core.find_conf(true)).not_to be_nil
7
7
  end
8
8
  end
9
9
  end
@@ -3,1165 +3,1175 @@ require 'spec_helper'
3
3
  describe "The Codesake Dawn knowledge base" do
4
4
  let (:kb) {Dawn::KnowledgeBase.new}
5
5
  it "must not be empty" do
6
- kb.all.size.should_not == 0
6
+ expect(kb.all.size).not_to eq(0)
7
7
 
8
8
  end
9
9
  it "must have a find method" do
10
- kb.should respond_to(:find)
10
+ expect(kb).to respond_to(:find)
11
11
  end
12
12
 
13
13
  it "must have an all_by_mvc method" do
14
- kb.should respond_to(:all_by_mvc)
14
+ expect(kb).to respond_to(:all_by_mvc)
15
15
  end
16
16
 
17
17
 
18
18
  it "will return a nil object if it doesn't find a particular security check" do
19
- kb.find("A non existant security check name").should be_nil
19
+ expect(kb.find("A non existant security check name")).to be_nil
20
20
  end
21
21
 
22
22
  it "must have at least a test for sinatra" do
23
- kb.all_by_mvc("sinatra").size.should > 0
23
+ expect(kb.all_by_mvc("sinatra").size).to be > 0
24
24
  end
25
25
 
26
26
  # KB Content
27
27
  it "must have test for CVE_2013_1855" do
28
28
  sc = kb.find("CVE-2013-1855")
29
- sc.should_not be_nil
30
- sc.class.should == Dawn::Kb::CVE_2013_1855
29
+ expect(sc).not_to be_nil
30
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1855)
31
31
  end
32
32
 
33
33
 
34
34
  it "must have test for CVE_2013_0333" do
35
35
  sc = kb.find("CVE-2013-0333")
36
- sc.should_not be_nil
37
- sc.class.should == Dawn::Kb::CVE_2013_0333
36
+ expect(sc).not_to be_nil
37
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0333)
38
38
  end
39
39
 
40
40
  it "must have test for CVE_2013_1857" do
41
41
  sc = kb.find("CVE-2013-1857")
42
- sc.should_not be_nil
43
- sc.class.should == Dawn::Kb::CVE_2013_1857
42
+ expect(sc).not_to be_nil
43
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1857)
44
44
  end
45
45
 
46
46
  it "must have test for CVE_2012_2660" do
47
47
  sc = kb.find("CVE-2012-2660")
48
- sc.should_not be_nil
49
- sc.class.should == Dawn::Kb::CVE_2012_2660
48
+ expect(sc).not_to be_nil
49
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2660)
50
50
  end
51
51
  it "must have test for CVE_2012_2661" do
52
52
  sc = kb.find("CVE-2012-2661")
53
- sc.should_not be_nil
54
- sc.class.should == Dawn::Kb::CVE_2012_2661
53
+ expect(sc).not_to be_nil
54
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2661)
55
55
  end
56
56
  it "must have test for CVE_2012_2694" do
57
57
  sc = kb.find("CVE-2012-2694")
58
- sc.should_not be_nil
59
- sc.class.should == Dawn::Kb::CVE_2012_2694
58
+ expect(sc).not_to be_nil
59
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2694)
60
60
  end
61
61
  it "must have test for CVE_2012_2695" do
62
62
  sc = kb.find("CVE-2012-2695")
63
- sc.should_not be_nil
64
- sc.class.should == Dawn::Kb::CVE_2012_2695
63
+ expect(sc).not_to be_nil
64
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2695)
65
65
  end
66
66
  it "must have test for CVE_2012_6496" do
67
67
  sc = kb.find("CVE-2012-6496")
68
- sc.should_not be_nil
69
- sc.class.should == Dawn::Kb::CVE_2012_6496
68
+ expect(sc).not_to be_nil
69
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6496)
70
70
  end
71
71
  it "must have test for CVE_2012_6497" do
72
72
  sc = kb.find("CVE-2012-6496")
73
- sc.should_not be_nil
74
- sc.class.should == Dawn::Kb::CVE_2012_6496
73
+ expect(sc).not_to be_nil
74
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6496)
75
75
  end
76
76
 
77
77
  it "must have test for CVE_2013_0269" do
78
78
  sc = kb.find("CVE-2013-0269")
79
- sc.should_not be_nil
80
- sc.class.should == Dawn::Kb::CVE_2013_0269
79
+ expect(sc).not_to be_nil
80
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0269)
81
81
  end
82
82
 
83
83
  it "must have test for CVE_2013_0155" do
84
84
  sc = kb.find("CVE-2013-0155")
85
- sc.should_not be_nil
86
- sc.class.should == Dawn::Kb::CVE_2013_0155
85
+ expect(sc).not_to be_nil
86
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0155)
87
87
  end
88
88
  it "must have test for CVE_2011_2931" do
89
89
  sc = kb.find("CVE-2011-2931")
90
- sc.should_not be_nil
91
- sc.class.should == Dawn::Kb::CVE_2011_2931
90
+ expect(sc).not_to be_nil
91
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2931)
92
92
  end
93
93
  it "must have test for CVE_2012_3465" do
94
94
  sc = kb.find("CVE-2012-3465")
95
- sc.should_not be_nil
96
- sc.class.should == Dawn::Kb::CVE_2012_3465
95
+ expect(sc).not_to be_nil
96
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_3465)
97
97
  end
98
98
 
99
99
  it "must have test for CVE_2013_1854" do
100
100
  sc = kb.find("CVE-2013-1854")
101
- sc.should_not be_nil
102
- sc.class.should == Dawn::Kb::CVE_2013_1854
101
+ expect(sc).not_to be_nil
102
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1854)
103
103
  end
104
104
 
105
105
  it "must have test for CVE_2013_1856" do
106
106
  sc = kb.find("CVE-2013-1856")
107
- sc.should_not be_nil
108
- sc.class.should == Dawn::Kb::CVE_2013_1856
107
+ expect(sc).not_to be_nil
108
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1856)
109
109
  end
110
110
 
111
111
  it "must have test for CVE_2013_0276" do
112
112
  sc = kb.find("CVE-2013-0276")
113
- sc.should_not be_nil
114
- sc.class.should == Dawn::Kb::CVE_2013_0276
113
+ expect(sc).not_to be_nil
114
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0276)
115
115
  end
116
116
 
117
117
  it "must have test for CVE_2013_0277" do
118
118
  sc = kb.find("CVE-2013-0277")
119
- sc.should_not be_nil
120
- sc.class.should == Dawn::Kb::CVE_2013_0277
119
+ expect(sc).not_to be_nil
120
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0277)
121
121
  end
122
122
 
123
123
  it "must have test for CVE_2013_0156" do
124
124
  sc = kb.find("CVE-2013-0156")
125
- sc.should_not be_nil
126
- sc.class.should == Dawn::Kb::CVE_2013_0156
125
+ expect(sc).not_to be_nil
126
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0156)
127
127
  end
128
128
 
129
129
  it "must have test for CVE-2013-2615" do
130
130
  sc = kb.find("CVE-2013-2615")
131
- sc.should_not be_nil
132
- sc.class.should == Dawn::Kb::CVE_2013_2615
131
+ expect(sc).not_to be_nil
132
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2615)
133
133
  end
134
134
 
135
135
  it "must have test for CVE-2013-1875" do
136
136
  sc = kb.find("CVE-2013-1875")
137
- sc.should_not be_nil
138
- sc.class.should == Dawn::Kb::CVE_2013_1875
137
+ expect(sc).not_to be_nil
138
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1875)
139
139
  end
140
140
 
141
141
  it "must have test for CVE-2013-1655" do
142
142
  sc = kb.find("CVE-2013-1655")
143
- sc.should_not be_nil
144
- sc.class.should == Dawn::Kb::CVE_2013_1655
143
+ expect(sc).not_to be_nil
144
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1655)
145
145
  end
146
146
  it "must have test for CVE-2013-1656" do
147
147
  sc = kb.find("CVE-2013-1656")
148
- sc.should_not be_nil
149
- sc.class.should == Dawn::Kb::CVE_2013_1656
148
+ expect(sc).not_to be_nil
149
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1656)
150
150
  end
151
151
 
152
152
  it "must have test for CVE-2013-0175" do
153
153
  sc = kb.find("CVE-2013-0175")
154
- sc.should_not be_nil
155
- sc.class.should == Dawn::Kb::CVE_2013_0175
154
+ expect(sc).not_to be_nil
155
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0175)
156
156
  end
157
157
  it "must have test for CVE-2013-0233" do
158
158
  sc = kb.find("CVE-2013-0233")
159
- sc.should_not be_nil
160
- sc.class.should == Dawn::Kb::CVE_2013_0233
159
+ expect(sc).not_to be_nil
160
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0233)
161
161
  end
162
162
  it "must have test for CVE-2013-0284" do
163
163
  sc = kb.find("CVE-2013-0284")
164
- sc.should_not be_nil
165
- sc.class.should == Dawn::Kb::CVE_2013_0284
164
+ expect(sc).not_to be_nil
165
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0284)
166
166
  end
167
167
  it "must have test for CVE-2013-0285" do
168
168
  sc = kb.find("CVE-2013-0285")
169
- sc.should_not be_nil
170
- sc.class.should == Dawn::Kb::CVE_2013_0285
169
+ expect(sc).not_to be_nil
170
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0285)
171
171
  end
172
172
  it "must have test for CVE-2013-1801" do
173
173
  sc = kb.find("CVE-2013-1801")
174
- sc.should_not be_nil
175
- sc.class.should == Dawn::Kb::CVE_2013_1801
174
+ expect(sc).not_to be_nil
175
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1801)
176
176
  end
177
177
  it "must have test for CVE-2013-1802" do
178
178
  sc = kb.find("CVE-2013-1802")
179
- sc.should_not be_nil
180
- sc.class.should == Dawn::Kb::CVE_2013_1802
179
+ expect(sc).not_to be_nil
180
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1802)
181
181
  end
182
182
  it "must have test for CVE-2013-1821" do
183
183
  sc = kb.find("CVE-2013-1821")
184
- sc.should_not be_nil
185
- sc.class.should == Dawn::Kb::CVE_2013_1821
184
+ expect(sc).not_to be_nil
185
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1821)
186
186
  end
187
187
  it "must have test for CVE-2013-1898" do
188
188
  sc = kb.find("CVE-2013-1898")
189
- sc.should_not be_nil
190
- sc.class.should == Dawn::Kb::CVE_2013_1898
189
+ expect(sc).not_to be_nil
190
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1898)
191
191
  end
192
192
  it "must have test for CVE-2013-1911" do
193
193
  sc = kb.find("CVE-2013-1911")
194
- sc.should_not be_nil
195
- sc.class.should == Dawn::Kb::CVE_2013_1911
194
+ expect(sc).not_to be_nil
195
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1911)
196
196
  end
197
197
  it "must have test for CVE-2013-1933" do
198
198
  sc = kb.find("CVE-2013-1933")
199
- sc.should_not be_nil
200
- sc.class.should == Dawn::Kb::CVE_2013_1933
199
+ expect(sc).not_to be_nil
200
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1933)
201
201
  end
202
202
  it "must have test for CVE-2013-1947" do
203
203
  sc = kb.find("CVE-2013-1947")
204
- sc.should_not be_nil
205
- sc.class.should == Dawn::Kb::CVE_2013_1947
204
+ expect(sc).not_to be_nil
205
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1947)
206
206
  end
207
207
  it "must have test for CVE-2013-1948" do
208
208
  sc = kb.find("CVE-2013-1948")
209
- sc.should_not be_nil
210
- sc.class.should == Dawn::Kb::CVE_2013_1948
209
+ expect(sc).not_to be_nil
210
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1948)
211
211
  end
212
212
  it "must have test for CVE-2013-2616" do
213
213
  sc = kb.find("CVE-2013-2616")
214
- sc.should_not be_nil
215
- sc.class.should == Dawn::Kb::CVE_2013_2616
214
+ expect(sc).not_to be_nil
215
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2616)
216
216
  end
217
217
  it "must have test for CVE-2013-2617" do
218
218
  sc = kb.find("CVE-2013-2617")
219
- sc.should_not be_nil
220
- sc.class.should == Dawn::Kb::CVE_2013_2617
219
+ expect(sc).not_to be_nil
220
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2617)
221
221
  end
222
222
  it "must have test for CVE-2013-3221" do
223
223
  sc = kb.find("CVE-2013-3221")
224
- sc.should_not be_nil
225
- sc.class.should == Dawn::Kb::CVE_2013_3221
224
+ expect(sc).not_to be_nil
225
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_3221)
226
226
  end
227
227
 
228
228
  it "must have test for CVE-2011-0447" do
229
229
  sc = kb.find("CVE-2011-0447")
230
- sc.should_not be_nil
231
- sc.class.should == Dawn::Kb::CVE_2011_0447
230
+ expect(sc).not_to be_nil
231
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_0447)
232
232
  end
233
233
 
234
234
  it "must have test for CVE-2011-3186" do
235
235
  sc = kb.find("CVE-2011-3186")
236
- sc.should_not be_nil
237
- sc.class.should == Dawn::Kb::CVE_2011_3186
236
+ expect(sc).not_to be_nil
237
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_3186)
238
238
  end
239
239
  it "must have test for CVE-2012-1099" do
240
240
  sc = kb.find("CVE-2012-1099")
241
- sc.should_not be_nil
242
- sc.class.should == Dawn::Kb::CVE_2012_1099
241
+ expect(sc).not_to be_nil
242
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_1099)
243
243
  end
244
244
  it "must have test for CVE-2012-1241" do
245
245
  sc = kb.find("CVE-2012-1241")
246
- sc.should_not be_nil
247
- sc.class.should == Dawn::Kb::CVE_2012_1241
246
+ expect(sc).not_to be_nil
247
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_1241)
248
248
  end
249
249
  it "must have test for CVE-2012-2140" do
250
250
  sc = kb.find("CVE-2012-2140")
251
- sc.should_not be_nil
252
- sc.class.should == Dawn::Kb::CVE_2012_2140
251
+ expect(sc).not_to be_nil
252
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2140)
253
253
  end
254
254
  it "must have test for CVE-2012-5370" do
255
255
  sc = kb.find("CVE-2012-5370")
256
- sc.should_not be_nil
257
- sc.class.should == Dawn::Kb::CVE_2012_5370
256
+ expect(sc).not_to be_nil
257
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_5370)
258
258
  end
259
259
  it "must have test for CVE-2012-5371" do
260
260
  sc = kb.find("CVE-2012-5371")
261
- sc.should_not be_nil
262
- sc.class.should == Dawn::Kb::CVE_2012_5371
261
+ expect(sc).not_to be_nil
262
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_5371)
263
263
  end
264
264
  it "must have test for CVE-2011-2197" do
265
265
  sc = kb.find("CVE-2011-2197")
266
- sc.should_not be_nil
267
- sc.class.should == Dawn::Kb::CVE_2011_2197
266
+ expect(sc).not_to be_nil
267
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2197)
268
268
  end
269
269
  it "must have test for CVE-2011-2932" do
270
270
  sc = kb.find("CVE-2011-2932")
271
- sc.should_not be_nil
272
- sc.class.should == Dawn::Kb::CVE_2011_2932
271
+ expect(sc).not_to be_nil
272
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2932)
273
273
  end
274
274
  it "must have test for CVE-2012-3463" do
275
275
  sc = kb.find("CVE-2012-3463")
276
- sc.should_not be_nil
277
- sc.class.should == Dawn::Kb::CVE_2012_3463
276
+ expect(sc).not_to be_nil
277
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_3463)
278
278
  end
279
279
  it "must have test for CVE-2012-3464" do
280
280
  sc = kb.find("CVE-2012-3464")
281
- sc.should_not be_nil
282
- sc.class.should == Dawn::Kb::CVE_2012_3464
281
+ expect(sc).not_to be_nil
282
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_3464)
283
283
  end
284
284
  it "must have test for CVE-2012-4464" do
285
285
  sc = kb.find("CVE-2012-4464")
286
- sc.should_not be_nil
287
- sc.class.should == Dawn::Kb::CVE_2012_4464
286
+ expect(sc).not_to be_nil
287
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_4464)
288
288
  end
289
289
  it "must have test for CVE-2012-4466" do
290
290
  sc = kb.find("CVE-2012-4466")
291
- sc.should_not be_nil
292
- sc.class.should == Dawn::Kb::CVE_2012_4466
291
+ expect(sc).not_to be_nil
292
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_4466)
293
293
  end
294
294
  it "must have test for CVE-2012-4481" do
295
295
  sc = kb.find("CVE-2012-4481")
296
- sc.should_not be_nil
297
- sc.class.should == Dawn::Kb::CVE_2012_4481
296
+ expect(sc).not_to be_nil
297
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_4481)
298
298
  end
299
299
  it "must have test for CVE-2012-6134" do
300
300
  sc = kb.find("CVE-2012-6134")
301
- sc.should_not be_nil
302
- sc.class.should == Dawn::Kb::CVE_2012_6134
301
+ expect(sc).not_to be_nil
302
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6134)
303
303
  end
304
304
  it "must have test for CVE-2012-6496" do
305
305
  sc = kb.find("CVE-2012-6496")
306
- sc.should_not be_nil
307
- sc.class.should == Dawn::Kb::CVE_2012_6496
306
+ expect(sc).not_to be_nil
307
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6496)
308
308
  end
309
309
 
310
310
  it "must have test for CVE-2012-6497" do
311
311
  sc = kb.find("CVE-2012-6497")
312
- sc.should_not be_nil
313
- sc.class.should == Dawn::Kb::CVE_2012_6497
312
+ expect(sc).not_to be_nil
313
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6497)
314
314
  end
315
315
 
316
316
  it "must have test for CVE-2010-1330" do
317
317
  sc = kb.find("CVE-2010-1330")
318
- sc.should_not be_nil
319
- sc.class.should == Dawn::Kb::CVE_2010_1330
318
+ expect(sc).not_to be_nil
319
+ expect(sc.class).to eq(Dawn::Kb::CVE_2010_1330)
320
320
  end
321
321
 
322
322
  it "must have test for CVE-2011-0446" do
323
323
  sc = kb.find("CVE-2011-0446")
324
- sc.should_not be_nil
325
- sc.class.should == Dawn::Kb::CVE_2011_0446
324
+ expect(sc).not_to be_nil
325
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_0446)
326
326
  end
327
327
 
328
328
  it "must have test for CVE-2011-0995" do
329
329
  sc = kb.find("CVE-2011-0995")
330
- sc.should_not be_nil
331
- sc.class.should == Dawn::Kb::CVE_2011_0995
330
+ expect(sc).not_to be_nil
331
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_0995)
332
332
  end
333
333
 
334
334
  it "must have test for CVE-2011-2929" do
335
335
  sc = kb.find("CVE-2011-2929")
336
- sc.should_not be_nil
337
- sc.class.should == Dawn::Kb::CVE_2011_2929
336
+ expect(sc).not_to be_nil
337
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2929)
338
338
  end
339
339
 
340
340
  it "must have test for CVE-2011-4815" do
341
341
  sc = kb.find("CVE-2011-4815")
342
- sc.should_not be_nil
343
- sc.class.should == Dawn::Kb::CVE_2011_4815
342
+ expect(sc).not_to be_nil
343
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_4815)
344
344
  end
345
345
 
346
346
  it "must have test for CVE-2012-3424" do
347
347
  sc = kb.find("CVE-2012-3424")
348
- sc.should_not be_nil
349
- sc.class.should == Dawn::Kb::CVE_2012_3424
348
+ expect(sc).not_to be_nil
349
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_3424)
350
350
  end
351
351
 
352
352
  it "must have test for CVE-2012-5380" do
353
353
  sc = kb.find("CVE-2012-5380")
354
- sc.should_not be_nil
355
- sc.class.should == Dawn::Kb::CVE_2012_5380
354
+ expect(sc).not_to be_nil
355
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_5380)
356
356
  end
357
357
 
358
358
  it "must have test for CVE-2012-4522" do
359
359
  sc = kb.find("CVE-2012-4522")
360
- sc.should_not be_nil
361
- sc.class.should == Dawn::Kb::CVE_2012_4522
360
+ expect(sc).not_to be_nil
361
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_4522)
362
362
  end
363
363
  it "must have test for CVE-2013-2065" do
364
364
  sc = kb.find("CVE-2013-2065")
365
- sc.should_not be_nil
366
- sc.class.should == Dawn::Kb::CVE_2013_2065
365
+ expect(sc).not_to be_nil
366
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2065)
367
367
  end
368
368
  it "must have test for CVE-2013-4389" do
369
369
  sc = kb.find("CVE-2013-4389")
370
- sc.should_not be_nil
371
- sc.class.should == Dawn::Kb::CVE_2013_4389
370
+ expect(sc).not_to be_nil
371
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4389)
372
372
  end
373
373
 
374
374
  it "must have test for CVE-2013-4164" do
375
375
  sc = kb.find("CVE-2013-4164")
376
- sc.should_not be_nil
377
- sc.class.should == Dawn::Kb::CVE_2013_4164
376
+ expect(sc).not_to be_nil
377
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4164)
378
378
  end
379
379
 
380
380
  it "must have test for CVE-2013-4562" do
381
381
  sc = kb.find("CVE-2013-4562")
382
- sc.should_not be_nil
383
- sc.class.should == Dawn::Kb::CVE_2013_4562
382
+ expect(sc).not_to be_nil
383
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4562)
384
384
  end
385
385
  it "must have test for CVE-2013-4457" do
386
386
  sc = kb.find("CVE-2013-4457")
387
- sc.should_not be_nil
388
- sc.class.should == Dawn::Kb::CVE_2013_4457
387
+ expect(sc).not_to be_nil
388
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4457)
389
389
  end
390
390
 
391
391
  it "must have test for 20131129-SimpleForm-Xss" do
392
392
  sc = kb.find("Simple Form XSS - 20131129")
393
- sc.should_not be_nil
394
- sc.class.should == Dawn::Kb::SimpleForm_Xss_20131129
393
+ expect(sc).not_to be_nil
394
+ expect(sc.class).to eq(Dawn::Kb::SimpleForm_Xss_20131129)
395
395
  end
396
396
 
397
397
  it "must have test for CVE-2013-4491" do
398
398
  sc = kb.find("CVE-2013-4491")
399
- sc.should_not be_nil
400
- sc.class.should == Dawn::Kb::CVE_2013_4491
399
+ expect(sc).not_to be_nil
400
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4491)
401
401
  end
402
402
 
403
403
  it "must have test for CVE-2013-4492" do
404
404
  sc = kb.find("CVE-2013-4492")
405
- sc.should_not be_nil
406
- sc.class.should == Dawn::Kb::CVE_2013_4492
405
+ expect(sc).not_to be_nil
406
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4492)
407
407
  end
408
408
  it "must have test for CVE-2013-6414" do
409
409
  sc = kb.find("CVE-2013-6414")
410
- sc.should_not be_nil
411
- sc.class.should == Dawn::Kb::CVE_2013_6414
410
+ expect(sc).not_to be_nil
411
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6414)
412
412
  end
413
413
  it "must have test for CVE-2013-6415" do
414
414
  sc = kb.find("CVE-2013-6415")
415
- sc.should_not be_nil
416
- sc.class.should == Dawn::Kb::CVE_2013_6415
415
+ expect(sc).not_to be_nil
416
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6415)
417
417
  end
418
418
  it "must have test for CVE-2013-6416" do
419
419
  sc = kb.find("CVE-2013-6416")
420
- sc.should_not be_nil
421
- sc.class.should == Dawn::Kb::CVE_2013_6416
420
+ expect(sc).not_to be_nil
421
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6416)
422
422
  end
423
423
 
424
424
  it "must have test for CVE-2013-6417" do
425
425
  sc = kb.find("CVE-2013-6417")
426
- sc.should_not be_nil
427
- sc.class.should == Dawn::Kb::CVE_2013_6417
426
+ expect(sc).not_to be_nil
427
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6417)
428
428
  end
429
429
 
430
430
  it "must have test for CVE-2013-6460" do
431
431
  sc = kb.find("CVE-2013-6460")
432
- sc.should_not be_nil
433
- sc.class.should == Dawn::Kb::CVE_2013_6460
432
+ expect(sc).not_to be_nil
433
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6460)
434
434
  end
435
435
  it "must have test for CVE-2013-6461" do
436
436
  sc = kb.find("CVE-2013-6461")
437
- sc.should_not be_nil
438
- sc.class.should == Dawn::Kb::CVE_2013_6461
437
+ expect(sc).not_to be_nil
438
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6461)
439
439
  end
440
440
  it "must have test for CVE-2013-4478" do
441
441
  sc = kb.find("CVE-2013-4478")
442
- sc.should_not be_nil
443
- sc.class.should == Dawn::Kb::CVE_2013_4478
442
+ expect(sc).not_to be_nil
443
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4478)
444
444
  end
445
445
  it "must have test for CVE-2013-4479" do
446
446
  sc = kb.find("CVE-2013-4479")
447
- sc.should_not be_nil
448
- sc.class.should == Dawn::Kb::CVE_2013_4479
447
+ expect(sc).not_to be_nil
448
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4479)
449
449
  end
450
450
  it "must have test for CVE-2013-1812" do
451
451
  sc = kb.find("CVE-2013-1812")
452
- sc.should_not be_nil
453
- sc.class.should == Dawn::Kb::CVE_2013_1812
452
+ expect(sc).not_to be_nil
453
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1812)
454
454
  end
455
455
  it "must have test for CVE-2013-6421" do
456
456
  sc = kb.find("CVE-2013-6421")
457
- sc.should_not be_nil
458
- sc.class.should == Dawn::Kb::CVE_2013_6421
457
+ expect(sc).not_to be_nil
458
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6421)
459
459
  end
460
460
 
461
461
  it "must have test for CVE-2004-0755" do
462
462
  sc = kb.find("CVE-2004-0755")
463
- sc.should_not be_nil
464
- sc.class.should == Dawn::Kb::CVE_2004_0755
463
+ expect(sc).not_to be_nil
464
+ expect(sc.class).to eq(Dawn::Kb::CVE_2004_0755)
465
465
  end
466
466
  it "must have test for CVE-2004-0983" do
467
467
  sc = kb.find("CVE-2004-0983")
468
- sc.should_not be_nil
469
- sc.class.should == Dawn::Kb::CVE_2004_0983
468
+ expect(sc).not_to be_nil
469
+ expect(sc.class).to eq(Dawn::Kb::CVE_2004_0983)
470
470
  end
471
471
  it "must have test for CVE-2005-1992" do
472
472
  sc = kb.find("CVE-2005-1992")
473
- sc.should_not be_nil
474
- sc.class.should == Dawn::Kb::CVE_2005_1992
473
+ expect(sc).not_to be_nil
474
+ expect(sc.class).to eq(Dawn::Kb::CVE_2005_1992)
475
475
  end
476
476
  it "must have test for CVE-2005-2337" do
477
477
  sc = kb.find("CVE-2005-2337")
478
- sc.should_not be_nil
479
- sc.class.should == Dawn::Kb::CVE_2005_2337
478
+ expect(sc).not_to be_nil
479
+ expect(sc.class).to eq(Dawn::Kb::CVE_2005_2337)
480
480
  end
481
481
  it "must have test for CVE-2006-1931" do
482
482
  sc = kb.find("CVE-2006-1931")
483
- sc.should_not be_nil
484
- sc.class.should == Dawn::Kb::CVE_2006_1931
483
+ expect(sc).not_to be_nil
484
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_1931)
485
485
  end
486
486
  it "must have test for CVE-2006-2582" do
487
487
  sc = kb.find("CVE-2006-2582")
488
- sc.should_not be_nil
489
- sc.class.should == Dawn::Kb::CVE_2006_2582
488
+ expect(sc).not_to be_nil
489
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_2582)
490
490
  end
491
491
  it "must have test for CVE-2006-3694" do
492
492
  sc = kb.find("CVE-2006-3694")
493
- sc.should_not be_nil
494
- sc.class.should == Dawn::Kb::CVE_2006_3694
493
+ expect(sc).not_to be_nil
494
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_3694)
495
495
  end
496
496
 
497
497
  it "must have test for CVE-2006-4112" do
498
498
  sc = kb.find("CVE-2006-4112")
499
- sc.should_not be_nil
500
- sc.class.should == Dawn::Kb::CVE_2006_4112
499
+ expect(sc).not_to be_nil
500
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_4112)
501
501
  end
502
502
 
503
503
  it "must have test for CVE-2006-5467" do
504
504
  sc = kb.find("CVE-2006-5467")
505
- sc.should_not be_nil
506
- sc.class.should == Dawn::Kb::CVE_2006_5467
505
+ expect(sc).not_to be_nil
506
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_5467)
507
507
  end
508
508
 
509
509
  it "must have test for CVE-2006-6303" do
510
510
  sc = kb.find("CVE-2006-6303")
511
- sc.should_not be_nil
512
- sc.class.should == Dawn::Kb::CVE_2006_6303
511
+ expect(sc).not_to be_nil
512
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_6303)
513
513
  end
514
514
  it "must have test for CVE-2006-6852" do
515
515
  sc = kb.find("CVE-2006-6852")
516
- sc.should_not be_nil
517
- sc.class.should == Dawn::Kb::CVE_2006_6852
516
+ expect(sc).not_to be_nil
517
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_6852)
518
518
  end
519
519
  it "must have test for CVE-2006-6979" do
520
520
  sc = kb.find("CVE-2006-6979")
521
- sc.should_not be_nil
522
- sc.class.should == Dawn::Kb::CVE_2006_6979
521
+ expect(sc).not_to be_nil
522
+ expect(sc.class).to eq(Dawn::Kb::CVE_2006_6979)
523
523
  end
524
524
  it "must have test for CVE-2007-0469" do
525
525
  sc = kb.find("CVE-2007-0469")
526
- sc.should_not be_nil
527
- sc.class.should == Dawn::Kb::CVE_2007_0469
526
+ expect(sc).not_to be_nil
527
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_0469)
528
528
  end
529
529
  it "must have test for CVE-2013-2090" do
530
530
  sc = kb.find("CVE-2013-2090")
531
- sc.should_not be_nil
532
- sc.class.should == Dawn::Kb::CVE_2013_2090
531
+ expect(sc).not_to be_nil
532
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2090)
533
533
  end
534
534
  it "must have test for CVE-2011-4319" do
535
535
  sc = kb.find("CVE-2011-4319")
536
- sc.should_not be_nil
537
- sc.class.should == Dawn::Kb::CVE_2011_4319
536
+ expect(sc).not_to be_nil
537
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_4319)
538
538
  end
539
539
  it "must have test for CVE-2011-3187" do
540
540
  sc = kb.find("CVE-2011-3187")
541
- sc.should_not be_nil
542
- sc.class.should == Dawn::Kb::CVE_2011_3187
541
+ expect(sc).not_to be_nil
542
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_3187)
543
543
  end
544
544
  it "must have test for CVE-2011-3009" do
545
545
  sc = kb.find("CVE-2011-3009")
546
- sc.should_not be_nil
547
- sc.class.should == Dawn::Kb::CVE_2011_3009
546
+ expect(sc).not_to be_nil
547
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_3009)
548
548
  end
549
549
 
550
550
  it "must have test for CVE-2011-2930" do
551
551
  sc = kb.find("CVE-2011-2930")
552
- sc.should_not be_nil
553
- sc.class.should == Dawn::Kb::CVE_2011_2930
552
+ expect(sc).not_to be_nil
553
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2930)
554
554
  end
555
555
 
556
556
  it "must have test for CVE-2011-2705" do
557
557
  sc = kb.find("CVE-2011-2705")
558
- sc.should_not be_nil
559
- sc.class.should == Dawn::Kb::CVE_2011_2705
558
+ expect(sc).not_to be_nil
559
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2705)
560
560
  end
561
561
  it "must have test for CVE-2011-2686" do
562
562
  sc = kb.find("CVE-2011-2686")
563
- sc.should_not be_nil
564
- sc.class.should == Dawn::Kb::CVE_2011_2686
563
+ expect(sc).not_to be_nil
564
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_2686)
565
565
  end
566
566
  it "must have test for CVE-2011-1005" do
567
567
  sc = kb.find("CVE-2011-1005")
568
- sc.should_not be_nil
569
- sc.class.should == Dawn::Kb::CVE_2011_1005
568
+ expect(sc).not_to be_nil
569
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_1005)
570
570
  end
571
571
  it "must have test for CVE-2011-1004" do
572
572
  sc = kb.find("CVE-2011-1004")
573
- sc.should_not be_nil
574
- sc.class.should == Dawn::Kb::CVE_2011_1004
573
+ expect(sc).not_to be_nil
574
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_1004)
575
575
  end
576
576
  it "must have test for CVE-2011-0739" do
577
577
  sc = kb.find("CVE-2011-0739")
578
- sc.should_not be_nil
579
- sc.class.should == Dawn::Kb::CVE_2011_0739
578
+ expect(sc).not_to be_nil
579
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_0739)
580
580
  end
581
581
  it "must have test for CVE-2011-0188" do
582
582
  sc = kb.find("CVE-2011-0188")
583
- sc.should_not be_nil
584
- sc.class.should == Dawn::Kb::CVE_2011_0188
583
+ expect(sc).not_to be_nil
584
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_0188)
585
585
  end
586
586
  it "must have test for CVE-2010-3933" do
587
587
  sc = kb.find("CVE-2010-3933")
588
- sc.should_not be_nil
589
- sc.class.should == Dawn::Kb::CVE_2010_3933
588
+ expect(sc).not_to be_nil
589
+ expect(sc.class).to eq(Dawn::Kb::CVE_2010_3933)
590
590
  end
591
591
  it "must have test for CVE-2010-2489" do
592
592
  sc = kb.find("CVE-2010-2489")
593
- sc.should_not be_nil
594
- sc.class.should == Dawn::Kb::CVE_2010_2489
593
+ expect(sc).not_to be_nil
594
+ expect(sc.class).to eq(Dawn::Kb::CVE_2010_2489)
595
595
  end
596
596
  it "must have test for CVE-2009-4214" do
597
597
  sc = kb.find("CVE-2009-4214")
598
- sc.should_not be_nil
599
- sc.class.should == Dawn::Kb::CVE_2009_4214
598
+ expect(sc).not_to be_nil
599
+ expect(sc.class).to eq(Dawn::Kb::CVE_2009_4214)
600
600
  end
601
601
  it "must have test for CVE-2009-4124" do
602
602
  sc = kb.find("CVE-2009-4124")
603
- sc.should_not be_nil
604
- sc.class.should == Dawn::Kb::CVE_2009_4124
603
+ expect(sc).not_to be_nil
604
+ expect(sc.class).to eq(Dawn::Kb::CVE_2009_4124)
605
605
  end
606
606
  it "must have test for CVE-2009-4078" do
607
607
  sc = kb.find("CVE-2009-4078")
608
- sc.should_not be_nil
609
- sc.class.should == Dawn::Kb::CVE_2009_4078
608
+ expect(sc).not_to be_nil
609
+ expect(sc.class).to eq(Dawn::Kb::CVE_2009_4078)
610
610
  end
611
611
  it "must have test for CVE-2008-7248" do
612
612
  sc = kb.find("CVE-2008-7248")
613
- sc.should_not be_nil
614
- sc.class.should == Dawn::Kb::CVE_2008_7248
613
+ expect(sc).not_to be_nil
614
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_7248)
615
615
  end
616
616
  it "must have test for CVE-2008-5189" do
617
617
  sc = kb.find("CVE-2008-5189")
618
- sc.should_not be_nil
619
- sc.class.should == Dawn::Kb::CVE_2008_5189
618
+ expect(sc).not_to be_nil
619
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_5189)
620
620
  end
621
621
  it "must have test for CVE-2008-4310" do
622
622
  sc = kb.find("CVE-2008-4310")
623
- sc.should_not be_nil
624
- sc.class.should == Dawn::Kb::CVE_2008_4310
623
+ expect(sc).not_to be_nil
624
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_4310)
625
625
  end
626
626
  it "must have test for CVE-2008-4094" do
627
627
  sc = kb.find("CVE-2008-4094")
628
- sc.should_not be_nil
629
- sc.class.should == Dawn::Kb::CVE_2008_4094
628
+ expect(sc).not_to be_nil
629
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_4094)
630
630
  end
631
631
  it "must have test for CVE-2008-3905" do
632
632
  sc = kb.find("CVE-2008-3905")
633
- sc.should_not be_nil
634
- sc.class.should == Dawn::Kb::CVE_2008_3905
633
+ expect(sc).not_to be_nil
634
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_3905)
635
635
  end
636
636
  it "must have test for CVE-2008-3790" do
637
637
  sc = kb.find("CVE-2008-3790")
638
- sc.should_not be_nil
639
- sc.class.should == Dawn::Kb::CVE_2008_3790
638
+ expect(sc).not_to be_nil
639
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_3790)
640
640
  end
641
641
  it "must have test for CVE-2008-3657" do
642
642
  sc = kb.find("CVE-2008-3657")
643
- sc.should_not be_nil
644
- sc.class.should == Dawn::Kb::CVE_2008_3657
643
+ expect(sc).not_to be_nil
644
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_3657)
645
645
  end
646
646
  it "must have test for CVE-2008-3655" do
647
647
  sc = kb.find("CVE-2008-3655")
648
- sc.should_not be_nil
649
- sc.class.should == Dawn::Kb::CVE_2008_3655
648
+ expect(sc).not_to be_nil
649
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_3655)
650
650
  end
651
651
  it "must have test for CVE-2008-2725" do
652
652
  sc = kb.find("CVE-2008-2725")
653
- sc.should_not be_nil
654
- sc.class.should == Dawn::Kb::CVE_2008_2725
653
+ expect(sc).not_to be_nil
654
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_2725)
655
655
  end
656
656
  it "must have test for CVE-2008-2663" do
657
657
  sc = kb.find("CVE-2008-2663")
658
- sc.should_not be_nil
659
- sc.class.should == Dawn::Kb::CVE_2008_2663
658
+ expect(sc).not_to be_nil
659
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_2663)
660
660
  end
661
661
  it "must have test for CVE-2008-2664" do
662
662
  sc = kb.find("CVE-2008-2664")
663
- sc.should_not be_nil
664
- sc.class.should == Dawn::Kb::CVE_2008_2664
663
+ expect(sc).not_to be_nil
664
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_2664)
665
665
  end
666
666
  it "must have test for CVE-2008-2662" do
667
667
  sc = kb.find("CVE-2008-2662")
668
- sc.should_not be_nil
669
- sc.class.should == Dawn::Kb::CVE_2008_2662
668
+ expect(sc).not_to be_nil
669
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_2662)
670
670
  end
671
671
  it "must have test for CVE-2008-2376" do
672
672
  sc = kb.find("CVE-2008-2376")
673
- sc.should_not be_nil
674
- sc.class.should == Dawn::Kb::CVE_2008_2376
673
+ expect(sc).not_to be_nil
674
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_2376)
675
675
  end
676
676
  it "must have test for CVE-2008-1891" do
677
677
  sc = kb.find("CVE-2008-1891")
678
- sc.should_not be_nil
679
- sc.class.should == Dawn::Kb::CVE_2008_1891
678
+ expect(sc).not_to be_nil
679
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_1891)
680
680
  end
681
681
  it "must have test for CVE-2008-1145" do
682
682
  sc = kb.find("CVE-2008-1145")
683
- sc.should_not be_nil
684
- sc.class.should == Dawn::Kb::CVE_2008_1145
683
+ expect(sc).not_to be_nil
684
+ expect(sc.class).to eq(Dawn::Kb::CVE_2008_1145)
685
685
  end
686
686
  it "must have test for CVE-2007-6612" do
687
687
  sc = kb.find("CVE-2007-6612")
688
- sc.should_not be_nil
689
- sc.class.should == Dawn::Kb::CVE_2007_6612
688
+ expect(sc).not_to be_nil
689
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_6612)
690
690
  end
691
691
  it "must have test for CVE-2007-6077" do
692
692
  sc = kb.find("CVE-2007-6077")
693
- sc.should_not be_nil
694
- sc.class.should == Dawn::Kb::CVE_2007_6077
693
+ expect(sc).not_to be_nil
694
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_6077)
695
695
  end
696
696
  it "must have test for CVE-2007-5770" do
697
697
  sc = kb.find("CVE-2007-5770")
698
- sc.should_not be_nil
699
- sc.class.should == Dawn::Kb::CVE_2007_5770
698
+ expect(sc).not_to be_nil
699
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_5770)
700
700
  end
701
701
  it "must have test for CVE-2007-5380" do
702
702
  sc = kb.find("CVE-2007-5380")
703
- sc.should_not be_nil
704
- sc.class.should == Dawn::Kb::CVE_2007_5380
703
+ expect(sc).not_to be_nil
704
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_5380)
705
705
  end
706
706
  it "must have test for CVE-2007-5379" do
707
707
  sc = kb.find("CVE-2007-5379")
708
- sc.should_not be_nil
709
- sc.class.should == Dawn::Kb::CVE_2007_5379
708
+ expect(sc).not_to be_nil
709
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_5379)
710
710
  end
711
711
  it "must have test for CVE-2007-5162" do
712
712
  sc = kb.find("CVE-2007-5162")
713
- sc.should_not be_nil
714
- sc.class.should == Dawn::Kb::CVE_2007_5162
713
+ expect(sc).not_to be_nil
714
+ expect(sc.class).to eq(Dawn::Kb::CVE_2007_5162)
715
715
  end
716
716
  it "must have test for CVE-2013-2119" do
717
717
  sc = kb.find("CVE-2013-2119")
718
- sc.should_not be_nil
719
- sc.class.should == Dawn::Kb::CVE_2013_2119
718
+ expect(sc).not_to be_nil
719
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2119)
720
720
  end
721
721
  it "must have test for CVE-2013-7086" do
722
722
  sc = kb.find("CVE-2013-7086")
723
- sc.should_not be_nil
724
- sc.class.should == Dawn::Kb::CVE_2013_7086
723
+ expect(sc).not_to be_nil
724
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_7086)
725
725
  end
726
726
  it "must have test for CVE-2013-6459" do
727
727
  sc = kb.find("CVE-2013-6459")
728
- sc.should_not be_nil
729
- sc.class.should == Dawn::Kb::CVE_2013_6459
728
+ expect(sc).not_to be_nil
729
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_6459)
730
730
  end
731
731
  it "must have test for CVE-2013-5647" do
732
732
  sc = kb.find("CVE-2013-5647")
733
- sc.should_not be_nil
734
- sc.class.should == Dawn::Kb::CVE_2013_5647
733
+ expect(sc).not_to be_nil
734
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_5647)
735
735
  end
736
736
  it "must have test for CVE-2013-0263" do
737
737
  sc = kb.find("CVE-2013-0263")
738
- sc.should_not be_nil
739
- sc.class.should == Dawn::Kb::CVE_2013_0263
738
+ expect(sc).not_to be_nil
739
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0263)
740
740
  end
741
741
  it "must have test for CVE-2013-0256" do
742
742
  sc = kb.find("CVE-2013-0256")
743
- sc.should_not be_nil
744
- sc.class.should == Dawn::Kb::CVE_2013_0256
743
+ expect(sc).not_to be_nil
744
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0256)
745
745
  end
746
746
  it "must have test for CVE-2013-0162" do
747
747
  sc = kb.find("CVE-2013-0162")
748
- sc.should_not be_nil
749
- sc.class.should == Dawn::Kb::CVE_2013_0162
748
+ expect(sc).not_to be_nil
749
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0162)
750
750
  end
751
751
  it "must have test for CVE-2012-2671" do
752
752
  sc = kb.find("CVE-2012-2671")
753
- sc.should_not be_nil
754
- sc.class.should == Dawn::Kb::CVE_2012_2671
753
+ expect(sc).not_to be_nil
754
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2671)
755
755
  end
756
756
  it "must have test for CVE-2012-2139" do
757
757
  sc = kb.find("CVE-2012-2139")
758
- sc.should_not be_nil
759
- sc.class.should == Dawn::Kb::CVE_2012_2139
758
+ expect(sc).not_to be_nil
759
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_2139)
760
760
  end
761
761
  it "must have test for CVE-2012-1098" do
762
762
  sc = kb.find("CVE-2012-1098")
763
- sc.should_not be_nil
764
- sc.class.should == Dawn::Kb::CVE_2012_1098
763
+ expect(sc).not_to be_nil
764
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_1098)
765
765
  end
766
766
  it "must have test for CVE-2013-1756" do
767
767
  sc = kb.find("CVE-2013-1756")
768
- sc.should_not be_nil
769
- sc.class.should == Dawn::Kb::CVE_2013_1756
768
+ expect(sc).not_to be_nil
769
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1756)
770
770
  end
771
771
  it "must have test for CVE-2014-1233" do
772
772
  sc = kb.find("CVE-2014-1233")
773
- sc.should_not be_nil
774
- sc.class.should == Dawn::Kb::CVE_2014_1233
773
+ expect(sc).not_to be_nil
774
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_1233)
775
775
  end
776
776
  it "must have test for CVE-2014-1234" do
777
777
  sc = kb.find("CVE-2014-1234")
778
- sc.should_not be_nil
779
- sc.class.should == Dawn::Kb::CVE_2014_1234
778
+ expect(sc).not_to be_nil
779
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_1234)
780
780
  end
781
781
  it "must have test for CVE-2013-4413" do
782
782
  sc = kb.find("CVE-2013-4413")
783
- sc.should_not be_nil
784
- sc.class.should == Dawn::Kb::CVE_2013_4413
783
+ expect(sc).not_to be_nil
784
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4413)
785
785
  end
786
786
 
787
787
  it "must have test for CVE-2013-4489" do
788
788
  sc = kb.find("CVE-2013-4489")
789
- sc.should_not be_nil
790
- sc.class.should == Dawn::Kb::CVE_2013_4489
789
+ expect(sc).not_to be_nil
790
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4489)
791
791
  end
792
792
  it "must have test for CVE-2013-5671" do
793
793
  sc = kb.find("CVE-2013-5671")
794
- sc.should_not be_nil
795
- sc.class.should == Dawn::Kb::CVE_2013_5671
794
+ expect(sc).not_to be_nil
795
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_5671)
796
796
  end
797
797
  it "must have test for CVE-2013-4593" do
798
798
  sc = kb.find("CVE-2013-4593")
799
- sc.should_not be_nil
800
- sc.class.should == Dawn::Kb::CVE_2013_4593
799
+ expect(sc).not_to be_nil
800
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4593)
801
801
  end
802
802
  it "must have test for CVE-2013-0262" do
803
803
  sc = kb.find("CVE-2013-0262")
804
- sc.should_not be_nil
805
- sc.class.should == Dawn::Kb::CVE_2013_0262
804
+ expect(sc).not_to be_nil
805
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0262)
806
806
  end
807
807
  it "must have test for CVE-2013-0184" do
808
808
  sc = kb.find("CVE-2013-0184")
809
- sc.should_not be_nil
810
- sc.class.should == Dawn::Kb::CVE_2013_0184
809
+ expect(sc).not_to be_nil
810
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0184)
811
811
  end
812
812
  it "must have test for CVE-2013-0183" do
813
813
  sc = kb.find("CVE-2013-0183")
814
- sc.should_not be_nil
815
- sc.class.should == Dawn::Kb::CVE_2013_0183
814
+ expect(sc).not_to be_nil
815
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_0183)
816
816
  end
817
817
  it "must have test for CVE-2012-6109" do
818
818
  sc = kb.find("CVE-2012-6109")
819
- sc.should_not be_nil
820
- sc.class.should == Dawn::Kb::CVE_2012_6109
819
+ expect(sc).not_to be_nil
820
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6109)
821
821
  end
822
822
  it "must have test for CVE-2011-5036" do
823
823
  sc = kb.find("CVE-2011-5036")
824
- sc.should_not be_nil
825
- sc.class.should == Dawn::Kb::CVE_2011_5036
824
+ expect(sc).not_to be_nil
825
+ expect(sc.class).to eq(Dawn::Kb::CVE_2011_5036)
826
826
  end
827
827
  it "must have test for CVE-2013-2516" do
828
828
  sc = kb.find("CVE-2013-2516")
829
- sc.should_not be_nil
830
- sc.class.should == Dawn::Kb::CVE_2013_2516
829
+ expect(sc).not_to be_nil
830
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2516)
831
831
  end
832
832
  it "must have test for CVE-2013-2513" do
833
833
  sc = kb.find("CVE-2013-2513")
834
- sc.should_not be_nil
835
- sc.class.should == Dawn::Kb::CVE_2013_2513
834
+ expect(sc).not_to be_nil
835
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2513)
836
836
  end
837
837
  it "must have test for CVE-2013-2512" do
838
838
  sc = kb.find("CVE-2013-2512")
839
- sc.should_not be_nil
840
- sc.class.should == Dawn::Kb::CVE_2013_2512
839
+ expect(sc).not_to be_nil
840
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2512)
841
841
  end
842
842
  it "must have test for CVE-2013-1607" do
843
843
  sc = kb.find("CVE-2013-1607")
844
- sc.should_not be_nil
845
- sc.class.should == Dawn::Kb::CVE_2013_1607
844
+ expect(sc).not_to be_nil
845
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_1607)
846
846
  end
847
847
  it "must have test for CVE-2014-0080" do
848
848
  sc = kb.find("CVE-2014-0080")
849
- sc.should_not be_nil
850
- sc.class.should == Dawn::Kb::CVE_2014_0080
849
+ expect(sc).not_to be_nil
850
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_0080)
851
851
 
852
852
  end
853
853
 
854
854
  it "must have test for CVE-2014-0081" do
855
855
  sc = kb.find("CVE-2014-0081")
856
- sc.should_not be_nil
857
- sc.class.should == Dawn::Kb::CVE_2014_0081
856
+ expect(sc).not_to be_nil
857
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_0081)
858
858
  end
859
859
  it "must have test for CVE-2014-0082" do
860
860
  sc = kb.find("CVE-2014-0082")
861
- sc.should_not be_nil
862
- sc.class.should == Dawn::Kb::CVE_2014_0082
861
+ expect(sc).not_to be_nil
862
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_0082)
863
863
  end
864
864
  it "must have test for CVE-2014-2322" do
865
865
  sc = kb.find("CVE-2014-2322")
866
- sc.should_not be_nil
867
- sc.class.should == Dawn::Kb::CVE_2014_2322
866
+ expect(sc).not_to be_nil
867
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_2322)
868
868
  end
869
869
 
870
870
  it "must have test for CVE-2014-0036" do
871
871
  sc = kb.find("CVE-2014-0036")
872
- sc.should_not be_nil
873
- sc.class.should == Dawn::Kb::CVE_2014_0036
872
+ expect(sc).not_to be_nil
873
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_0036)
874
874
  end
875
875
  it "must have test for CVE-2014-2538" do
876
876
  sc = kb.find("CVE-2014-2538")
877
- sc.should_not be_nil
878
- sc.class.should == Dawn::Kb::CVE_2014_2538
877
+ expect(sc).not_to be_nil
878
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_2538)
879
879
  end
880
880
  it "must have test for CVE-2013-4203" do
881
881
  sc = kb.find("CVE-2013-4203")
882
- sc.should_not be_nil
883
- sc.class.should == Dawn::Kb::CVE_2013_4203
882
+ expect(sc).not_to be_nil
883
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_4203)
884
884
  end
885
885
  it "must have test for CVE-2014-2525" do
886
886
  sc = kb.find("CVE-2014-2525")
887
- sc.should_not be_nil
888
- sc.class.should == Dawn::Kb::CVE_2014_2525
887
+ expect(sc).not_to be_nil
888
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_2525)
889
889
  end
890
890
  it "must have test for OSVDB_105971" do
891
891
  sc = kb.find("OSVDB-105971")
892
- sc.should_not be_nil
893
- sc.class.should == Dawn::Kb::OSVDB_105971
892
+ expect(sc).not_to be_nil
893
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_105971)
894
894
  end
895
895
 
896
896
  it "must have test for CVE-2014-0130" do
897
897
  sc = kb.find("CVE-2014-0130")
898
- sc.should_not be_nil
899
- sc.class.should == Dawn::Kb::CVE_2014_0130
898
+ expect(sc).not_to be_nil
899
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_0130)
900
900
  end
901
901
  it "must have test for CVE-2013-2105" do
902
902
  sc = kb.find("CVE-2013-2105")
903
- sc.should_not be_nil
904
- sc.class.should == Dawn::Kb::CVE_2013_2105
903
+ expect(sc).not_to be_nil
904
+ expect(sc.class).to eq(Dawn::Kb::CVE_2013_2105)
905
905
  end
906
906
  it "must have test for OSVDB-108569" do
907
907
  sc = kb.find("OSVDB-108569")
908
- sc.should_not be_nil
909
- sc.class.should == Dawn::Kb::OSVDB_108569
908
+ expect(sc).not_to be_nil
909
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_108569)
910
910
  end
911
911
 
912
912
  it "must have test for OSVDB-108570" do
913
913
  sc = kb.find("OSVDB-108570")
914
- sc.should_not be_nil
915
- sc.class.should == Dawn::Kb::OSVDB_108570
914
+ expect(sc).not_to be_nil
915
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_108570)
916
916
  end
917
917
 
918
918
  it "must have test for OSVDB-108530" do
919
919
  sc = kb.find("OSVDB-108530")
920
- sc.should_not be_nil
921
- sc.class.should == Dawn::Kb::OSVDB_108530
920
+ expect(sc).not_to be_nil
921
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_108530)
922
922
  end
923
923
  it "must have test for OSVDB-108563" do
924
924
  sc = kb.find("OSVDB-108563")
925
- sc.should_not be_nil
926
- sc.class.should == Dawn::Kb::OSVDB_108563
925
+ expect(sc).not_to be_nil
926
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_108563)
927
927
  end
928
928
 
929
929
  it "must have test for CVE-2014-3482" do
930
930
  sc = kb.find("CVE-2014-3482")
931
- sc.should_not be_nil
932
- sc.class.should == Dawn::Kb::CVE_2014_3482
931
+ expect(sc).not_to be_nil
932
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_3482)
933
933
  end
934
934
 
935
935
  it "must have test for CVE-2014-3483" do
936
936
  sc = kb.find("CVE-2014-3483")
937
- sc.should_not be_nil
938
- sc.class.should == Dawn::Kb::CVE_2014_3483
937
+ expect(sc).not_to be_nil
938
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_3483)
939
939
  end
940
940
  it "must have test for OSVDB_119927" do
941
941
  sc = kb.find("OSVDB_119927")
942
- sc.should_not be_nil
943
- sc.class.should == Dawn::Kb::OSVDB_119927
942
+ expect(sc).not_to be_nil
943
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_119927)
944
944
  end
945
945
  it "must have test for OSVDB_119878" do
946
946
  sc = kb.find("OSVDB_119878")
947
- sc.should_not be_nil
948
- sc.class.should == Dawn::Kb::OSVDB_119878
947
+ expect(sc).not_to be_nil
948
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_119878)
949
949
  end
950
950
  it "must have test for OSVDB_118954" do
951
951
  sc = kb.find("OSVDB_118954")
952
- sc.should_not be_nil
953
- sc.class.should == Dawn::Kb::OSVDB_118954
952
+ expect(sc).not_to be_nil
953
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_118954)
954
954
  end
955
955
  it "must have test for OSVDB_118579" do
956
956
  sc = kb.find("OSVDB_118579")
957
- sc.should_not be_nil
958
- sc.class.should == Dawn::Kb::OSVDB_118579
957
+ expect(sc).not_to be_nil
958
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_118579)
959
959
  end
960
960
  it "must have test for OSVDB_118830" do
961
961
  sc = kb.find("OSVDB_118830")
962
- sc.should_not be_nil
963
- sc.class.should == Dawn::Kb::OSVDB_118830
962
+ expect(sc).not_to be_nil
963
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_118830)
964
964
  end
965
965
  it "must have test for CVE-2015-3224" do
966
966
  sc = kb.find("CVE-2015-3224")
967
- sc.should_not be_nil
968
- sc.class.should == Dawn::Kb::CVE_2015_3224
967
+ expect(sc).not_to be_nil
968
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_3224)
969
969
  end
970
970
  it "must have test for CVE-2015-3225" do
971
971
  sc = kb.find("CVE-2015-3225")
972
- sc.should_not be_nil
973
- sc.class.should == Dawn::Kb::CVE_2015_3225
972
+ expect(sc).not_to be_nil
973
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_3225)
974
974
  end
975
975
  it "must have test for CVE-2015-3227" do
976
976
  sc = kb.find("CVE-2015-3227")
977
- sc.should_not be_nil
978
- sc.class.should == Dawn::Kb::CVE_2015_3227
977
+ expect(sc).not_to be_nil
978
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_3227)
979
979
  end
980
980
  it "must have test for CVE-2015-3226" do
981
981
  sc = kb.find("CVE-2015-3226")
982
- sc.should_not be_nil
983
- sc.class.should == Dawn::Kb::CVE_2015_3226
982
+ expect(sc).not_to be_nil
983
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_3226)
984
984
  end
985
985
  it "must have test for CVE-2015-2963" do
986
986
  sc = kb.find("CVE-2015-2963")
987
- sc.should_not be_nil
988
- sc.class.should == Dawn::Kb::CVE_2015_2963
987
+ expect(sc).not_to be_nil
988
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_2963)
989
989
  end
990
990
  it "CVE-2015-1840 can't be tested. Trust me. It works"
991
991
  it "must have test for CVE-2015-3448" do
992
992
  sc = kb.find("CVE-2015-3448")
993
- sc.should_not be_nil
994
- sc.class.should == Dawn::Kb::CVE_2015_3448
993
+ expect(sc).not_to be_nil
994
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_3448)
995
995
  end
996
996
  it "must have test for CVE-2014-9490" do
997
997
  sc = kb.find("CVE-2014-9490")
998
- sc.should_not be_nil
999
- sc.class.should == Dawn::Kb::CVE_2014_9490
998
+ expect(sc).not_to be_nil
999
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_9490)
1000
1000
  end
1001
1001
  it "must have test for CVE-2012-6684" do
1002
1002
  sc = kb.find("CVE-2012-6684")
1003
- sc.should_not be_nil
1004
- sc.class.should == Dawn::Kb::CVE_2012_6684
1003
+ expect(sc).not_to be_nil
1004
+ expect(sc.class).to eq(Dawn::Kb::CVE_2012_6684)
1005
1005
  end
1006
1006
  it "must have test for CVE-2014-8090" do
1007
1007
  sc = kb.find("CVE-2014-8090")
1008
- sc.should_not be_nil
1009
- sc.class.should == Dawn::Kb::CVE_2014_8090
1008
+ expect(sc).not_to be_nil
1009
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_8090)
1010
1010
  end
1011
1011
  it "must have test for CVE-2014-7829" do
1012
1012
  sc = kb.find("CVE-2014-7829")
1013
- sc.should_not be_nil
1014
- sc.class.should == Dawn::Kb::CVE_2014_7829
1013
+ expect(sc).not_to be_nil
1014
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_7829)
1015
1015
  end
1016
1016
  it "must have test for CVE-2014-3916" do
1017
1017
  sc = kb.find("CVE-2014-3916")
1018
- sc.should_not be_nil
1019
- sc.class.should == Dawn::Kb::CVE_2014_3916
1018
+ expect(sc).not_to be_nil
1019
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_3916)
1020
1020
  end
1021
1021
  it "not sure if it must have check for CVE-2014-3248. Too much gem involved in a single CVE only with ruby 1.9.1 and with social engineering required"
1022
1022
  it "must have test for CVE-2014-4975" do
1023
1023
  sc = kb.find("CVE-2014-4975")
1024
- sc.should_not be_nil
1025
- sc.class.should == Dawn::Kb::CVE_2014_4975
1024
+ expect(sc).not_to be_nil
1025
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_4975)
1026
1026
  end
1027
1027
  it "must have test for CVE-2014-7819" do
1028
1028
  sc = kb.find("CVE-2014-7819")
1029
- sc.should_not be_nil
1030
- sc.class.should == Dawn::Kb::CVE_2014_7819
1029
+ expect(sc).not_to be_nil
1030
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_7819)
1031
1031
  end
1032
1032
  it "must have test for CVE-2014-7818" do
1033
1033
  sc = kb.find("CVE-2014-7818")
1034
- sc.should_not be_nil
1035
- sc.class.should == Dawn::Kb::CVE_2014_7818
1034
+ expect(sc).not_to be_nil
1035
+ expect(sc.class).to eq(Dawn::Kb::CVE_2014_7818)
1036
1036
  end
1037
1037
  it "must have test for OSVDB_120415" do
1038
1038
  sc = kb.find("OSVDB_120415")
1039
- sc.should_not be_nil
1040
- sc.class.should == Dawn::Kb::OSVDB_120415
1039
+ expect(sc).not_to be_nil
1040
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_120415)
1041
1041
  end
1042
1042
  it "must have test for OSVDB_120857" do
1043
1043
  sc = kb.find("OSVDB_120857")
1044
- sc.should_not be_nil
1045
- sc.class.should == Dawn::Kb::OSVDB_120857
1044
+ expect(sc).not_to be_nil
1045
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_120857)
1046
1046
  end
1047
1047
  it "must have test for OSVDB_121701" do
1048
1048
  sc = kb.find("OSVDB_121701")
1049
- sc.should_not be_nil
1050
- sc.class.should == Dawn::Kb::OSVDB_121701
1049
+ expect(sc).not_to be_nil
1050
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_121701)
1051
1051
  end
1052
1052
  it "must have test for CVE-2015-4020" do
1053
1053
  sc = kb.find("CVE-2015-4020")
1054
- sc.should_not be_nil
1055
- sc.class.should == Dawn::Kb::CVE_2015_4020
1054
+ expect(sc).not_to be_nil
1055
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_4020)
1056
1056
  end
1057
1057
  it "must have test for OSVDB_117903" do
1058
1058
  sc = kb.find("OSVDB_117903")
1059
- sc.should_not be_nil
1060
- sc.class.should == Dawn::Kb::OSVDB_117903
1059
+ expect(sc).not_to be_nil
1060
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_117903)
1061
1061
  end
1062
1062
  it "must have test for OSVDB_115654" do
1063
1063
  sc = kb.find("OSVDB_115654")
1064
- sc.should_not be_nil
1065
- sc.class.should == Dawn::Kb::OSVDB_115654
1064
+ expect(sc).not_to be_nil
1065
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_115654)
1066
1066
  end
1067
1067
  it "must have test for OSVDB_116010" do
1068
1068
  sc = kb.find("OSVDB_116010")
1069
- sc.should_not be_nil
1070
- sc.class.should == Dawn::Kb::OSVDB_116010
1069
+ expect(sc).not_to be_nil
1070
+ expect(sc.class).to eq(Dawn::Kb::OSVDB_116010)
1071
1071
  end
1072
1072
  it "must have test for CVE-2015-1819" do
1073
1073
  sc = kb.find("CVE-2015-1819")
1074
- sc.should_not be_nil
1075
- sc.class.should == Dawn::Kb::CVE_2015_1819
1074
+ expect(sc).not_to be_nil
1075
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_1819)
1076
1076
  end
1077
1077
  it "must have test for CVE-2015-7576" do
1078
1078
  sc = kb.find("CVE-2015-7576")
1079
- sc.should_not be_nil
1080
- sc.class.should == Dawn::Kb::CVE_2015_7576
1079
+ expect(sc).not_to be_nil
1080
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7576)
1081
1081
  end
1082
1082
  it "must have test for CVE-2016-0751" do
1083
1083
  sc = kb.find("CVE-2016-0751")
1084
- sc.should_not be_nil
1085
- sc.class.should == Dawn::Kb::CVE_2016_0751
1084
+ expect(sc).not_to be_nil
1085
+ expect(sc.class).to eq(Dawn::Kb::CVE_2016_0751)
1086
1086
  end
1087
1087
  it "must have test for CVE-2015-7577" do
1088
1088
  sc = kb.find("CVE-2015-7577")
1089
- sc.should_not be_nil
1090
- sc.class.should == Dawn::Kb::CVE_2015_7577
1089
+ expect(sc).not_to be_nil
1090
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7577)
1091
1091
  end
1092
1092
  it "must have test for CVE-2015-7579" do
1093
1093
  sc = kb.find("CVE-2015-7579")
1094
- sc.should_not be_nil
1095
- sc.class.should == Dawn::Kb::CVE_2015_7579
1094
+ expect(sc).not_to be_nil
1095
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7579)
1096
1096
  end
1097
1097
  it "must have test for CVE-2016-0752" do
1098
1098
  sc = kb.find("CVE-2016-0752")
1099
- sc.should_not be_nil
1100
- sc.class.should == Dawn::Kb::CVE_2016_0752
1099
+ expect(sc).not_to be_nil
1100
+ expect(sc.class).to eq(Dawn::Kb::CVE_2016_0752)
1101
1101
  end
1102
1102
  it "must have test for CVE-2016-0753" do
1103
1103
  sc = kb.find("CVE-2016-0753")
1104
- sc.should_not be_nil
1105
- sc.class.should == Dawn::Kb::CVE_2016_0753
1104
+ expect(sc).not_to be_nil
1105
+ expect(sc.class).to eq(Dawn::Kb::CVE_2016_0753)
1106
1106
  end
1107
1107
  it "must have test for CVE-2015-7578" do
1108
1108
  sc = kb.find("CVE-2015-7578")
1109
- sc.should_not be_nil
1110
- sc.class.should == Dawn::Kb::CVE_2015_7578
1109
+ expect(sc).not_to be_nil
1110
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7578)
1111
1111
  end
1112
1112
  it "must have test for CVE-2015-7581" do
1113
1113
  sc = kb.find("CVE-2015-7581")
1114
- sc.should_not be_nil
1115
- sc.class.should == Dawn::Kb::CVE_2015_7581
1114
+ expect(sc).not_to be_nil
1115
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7581)
1116
1116
  end
1117
1117
  it "must have test for CVE-2015-5312" do
1118
1118
  sc = kb.find("CVE-2015-5312")
1119
- sc.should_not be_nil
1120
- sc.class.should == Dawn::Kb::CVE_2015_5312
1119
+ expect(sc).not_to be_nil
1120
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_5312)
1121
1121
  end
1122
1122
  it "must have test for CVE-2015-7497" do
1123
1123
  sc = kb.find("CVE-2015-7497")
1124
- sc.should_not be_nil
1125
- sc.class.should == Dawn::Kb::CVE_2015_7497
1124
+ expect(sc).not_to be_nil
1125
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7497)
1126
1126
  end
1127
1127
  it "must have test for CVE-2015-7498" do
1128
1128
  sc = kb.find("CVE-2015-7498")
1129
- sc.should_not be_nil
1130
- sc.class.should == Dawn::Kb::CVE_2015_7498
1129
+ expect(sc).not_to be_nil
1130
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7498)
1131
1131
  end
1132
1132
  it "must have test for CVE-2015-7499" do
1133
1133
  sc = kb.find("CVE-2015-7499")
1134
- sc.should_not be_nil
1135
- sc.class.should == Dawn::Kb::CVE_2015_7499
1134
+ expect(sc).not_to be_nil
1135
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7499)
1136
1136
  end
1137
1137
  it "must have test for CVE-2015-7500" do
1138
1138
  sc = kb.find("CVE-2015-7500")
1139
- sc.should_not be_nil
1140
- sc.class.should == Dawn::Kb::CVE_2015_7500
1139
+ expect(sc).not_to be_nil
1140
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7500)
1141
1141
  end
1142
1142
  it "must have test for CVE-2015-8241" do
1143
1143
  sc = kb.find("CVE-2015-8241")
1144
- sc.should_not be_nil
1145
- sc.class.should == Dawn::Kb::CVE_2015_8241
1144
+ expect(sc).not_to be_nil
1145
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_8241)
1146
1146
  end
1147
1147
  it "must have test for CVE-2015-8242" do
1148
1148
  sc = kb.find("CVE-2015-8242")
1149
- sc.should_not be_nil
1150
- sc.class.should == Dawn::Kb::CVE_2015_8242
1149
+ expect(sc).not_to be_nil
1150
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_8242)
1151
1151
  end
1152
1152
  it "must have test for CVE-2015-8317" do
1153
1153
  sc = kb.find("CVE-2015-8317")
1154
- sc.should_not be_nil
1155
- sc.class.should == Dawn::Kb::CVE_2015_8317
1154
+ expect(sc).not_to be_nil
1155
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_8317)
1156
1156
  end
1157
1157
  it "must have test for CVE-2015-7541" do
1158
1158
  sc = kb.find("CVE-2015-7541")
1159
- sc.should_not be_nil
1160
- sc.class.should == Dawn::Kb::CVE_2015_7541
1159
+ expect(sc).not_to be_nil
1160
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7541)
1161
1161
  end
1162
1162
  it "must have test for CVE-2015-7519" do
1163
1163
  sc = kb.find("CVE-2015-7519")
1164
- sc.should_not be_nil
1165
- sc.class.should == Dawn::Kb::CVE_2015_7519
1164
+ expect(sc).not_to be_nil
1165
+ expect(sc.class).to eq(Dawn::Kb::CVE_2015_7519)
1166
+ end
1167
+ it "must have test for CVE-2016-2098" do
1168
+ sc = kb.find("CVE-2016-2098")
1169
+ expect(sc).not_to be_nil
1170
+ expect(sc.class).to eq(Dawn::Kb::CVE_2016_2098)
1171
+ end
1172
+ it "must have test for CVE-2016-2097" do
1173
+ sc = kb.find("CVE-2016-2097")
1174
+ expect(sc).not_to be_nil
1175
+ expect(sc.class).to eq(Dawn::Kb::CVE_2016_2097)
1166
1176
  end
1167
1177
  end