dawnscanner 1.6.1 → 1.6.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/.ruby-version +1 -1
- data/.travis.yml +2 -0
- data/Changelog.md +10 -1
- data/KnowledgeBase.md +10 -4
- data/README.md +1 -1
- data/Rakefile +12 -8
- data/VERSION +1 -1
- data/checksum/dawnscanner-1.6.1.gem.sha1 +1 -0
- data/lib/dawn/kb/cve_2016_2097.rb +35 -0
- data/lib/dawn/kb/cve_2016_2098.rb +34 -0
- data/lib/dawn/knowledge_base.rb +4 -0
- data/lib/dawn/version.rb +4 -4
- data/spec/lib/dawn/codesake_core_spec.rb +1 -1
- data/spec/lib/dawn/codesake_knowledgebase_spec.rb +451 -441
- data/spec/lib/dawn/codesake_padrino_engine_disabled.rb +11 -11
- data/spec/lib/dawn/codesake_rails_engine_disabled.rb +2 -2
- data/spec/lib/dawn/codesake_sinatra_engine_disabled.rb +36 -36
- data/spec/lib/kb/codesake_cve_2013_0175_spec.rb +6 -6
- data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +7 -7
- data/spec/lib/kb/codesake_dependency_version_check_spec.rb +10 -10
- data/spec/lib/kb/codesake_deprecation_check_spec.rb +11 -11
- data/spec/lib/kb/codesake_ruby_version_check_spec.rb +4 -4
- data/spec/lib/kb/codesake_version_check_spec.rb +42 -42
- data/spec/lib/kb/cve_2011_2705_spec.rb +7 -7
- data/spec/lib/kb/cve_2011_2930_spec.rb +6 -6
- data/spec/lib/kb/cve_2011_3009_spec.rb +4 -4
- data/spec/lib/kb/cve_2011_3187_spec.rb +4 -4
- data/spec/lib/kb/cve_2011_4319_spec.rb +9 -9
- data/spec/lib/kb/cve_2011_5036_spec.rb +21 -21
- data/spec/lib/kb/cve_2012_1098_spec.rb +7 -7
- data/spec/lib/kb/cve_2012_2139_spec.rb +3 -3
- data/spec/lib/kb/cve_2012_2671_spec.rb +4 -4
- data/spec/lib/kb/cve_2012_6109_spec.rb +25 -25
- data/spec/lib/kb/cve_2012_6684_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_0162_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_0183_spec.rb +11 -11
- data/spec/lib/kb/cve_2013_0184_spec.rb +26 -26
- data/spec/lib/kb/cve_2013_0256_spec.rb +6 -6
- data/spec/lib/kb/cve_2013_0262_spec.rb +9 -9
- data/spec/lib/kb/cve_2013_0263_spec.rb +1 -1
- data/spec/lib/kb/cve_2013_1607_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_1655_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_1756_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_2090_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_2105_spec.rb +1 -1
- data/spec/lib/kb/cve_2013_2119_spec.rb +5 -5
- data/spec/lib/kb/cve_2013_2512_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_2513_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_2516_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4203_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4413_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4489_spec.rb +11 -11
- data/spec/lib/kb/cve_2013_4491_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4593_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_5647_spec.rb +3 -3
- data/spec/lib/kb/cve_2013_5671_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_6416_spec.rb +5 -5
- data/spec/lib/kb/cve_2013_6459_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_7086_spec.rb +3 -3
- data/spec/lib/kb/cve_2014_0036_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_0080_spec.rb +5 -5
- data/spec/lib/kb/cve_2014_0081_spec.rb +10 -10
- data/spec/lib/kb/cve_2014_0082_spec.rb +8 -8
- data/spec/lib/kb/cve_2014_0130_spec.rb +3 -3
- data/spec/lib/kb/cve_2014_1233_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_1234_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_2322_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_2538_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_3482_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_3483_spec.rb +5 -5
- data/spec/lib/kb/cve_2014_7818_spec.rb +8 -8
- data/spec/lib/kb/cve_2014_7819_spec.rb +32 -32
- data/spec/lib/kb/cve_2014_7829_spec.rb +10 -10
- data/spec/lib/kb/cve_2014_9490_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_1819_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_1840_spec.rb +7 -7
- data/spec/lib/kb/cve_2015_2963_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_3224_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_3225_spec.rb +5 -5
- data/spec/lib/kb/cve_2015_3226_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_3227_spec.rb +5 -5
- data/spec/lib/kb/cve_2015_3448_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_4020_spec.rb +4 -4
- data/spec/lib/kb/cve_2015_5312_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7497_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7498_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7499_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7500_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7519_spec.rb +4 -4
- data/spec/lib/kb/cve_2015_7541_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_7576_spec.rb +11 -11
- data/spec/lib/kb/cve_2015_7577_spec.rb +11 -11
- data/spec/lib/kb/cve_2015_7578_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_7579_spec.rb +4 -4
- data/spec/lib/kb/cve_2015_7581_spec.rb +11 -11
- data/spec/lib/kb/cve_2015_8241_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_8242_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_8317_spec.rb +6 -6
- data/spec/lib/kb/cve_2016_0751_spec.rb +11 -11
- data/spec/lib/kb/cve_2016_0752_spec.rb +11 -11
- data/spec/lib/kb/cve_2016_0753_spec.rb +11 -11
- data/spec/lib/kb/cve_2016_2097_spec.rb +35 -0
- data/spec/lib/kb/cve_2016_2098_spec.rb +39 -0
- data/spec/lib/kb/osvdb_105971_spec.rb +2 -2
- data/spec/lib/kb/osvdb_108530_spec.rb +3 -3
- data/spec/lib/kb/osvdb_108563_spec.rb +2 -2
- data/spec/lib/kb/osvdb_108569_spec.rb +2 -2
- data/spec/lib/kb/osvdb_108570_spec.rb +2 -2
- data/spec/lib/kb/osvdb_115654_spec.rb +2 -2
- data/spec/lib/kb/osvdb_116010_spec.rb +2 -2
- data/spec/lib/kb/osvdb_117903_spec.rb +4 -4
- data/spec/lib/kb/osvdb_118830_spec.rb +2 -2
- data/spec/lib/kb/osvdb_118954_spec.rb +3 -3
- data/spec/lib/kb/osvdb_119878_spec.rb +21 -21
- data/spec/lib/kb/osvdb_119927_spec.rb +2 -2
- data/spec/lib/kb/osvdb_120415_spec.rb +2 -2
- data/spec/lib/kb/osvdb_120857_spec.rb +6 -6
- data/spec/lib/kb/osvdb_121701_spec.rb +2 -2
- data/spec/lib/kb/owasp_ror_cheatsheet_disabled.rb +10 -10
- metadata +9 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 970e93679f0ac361a19a2e761c8918f91b80686e
|
4
|
+
data.tar.gz: 8ad5519fc5d4ad77eb1d3d771756a9116cede2a0
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1aad748210b7509d5a13cf0c84eb82054bdf6cb54fed4775613de32a202acc2107f612f2b6e05b85e92269887883daadb7ace0676862c117f5170a4a953012b2
|
7
|
+
data.tar.gz: 46d1200055f2f5db08aa2bcc1e8a211a5025ff6c907f87568360696031c761589deef850b38388651d6fd1b6df3749c9604d79bbe35b8fbdfbd2f66103868c48
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
data/.ruby-version
CHANGED
@@ -1 +1 @@
|
|
1
|
-
2.
|
1
|
+
2.3.0
|
data/.travis.yml
CHANGED
data/Changelog.md
CHANGED
@@ -5,7 +5,16 @@ It supports [Sinatra](http://www.sinatrarb.com),
|
|
5
5
|
[Padrino](http://www.padrinorb.com) and [Ruby on Rails](http://rubyonrails.org)
|
6
6
|
frameworks.
|
7
7
|
|
8
|
-
_latest update:
|
8
|
+
_latest update: Tue Mar 1 23:11:10 CET 2016_
|
9
|
+
|
10
|
+
## Version 1.6.2 - codename: Tow Mater (2016-03-02)
|
11
|
+
|
12
|
+
* Issue #194 - Adding a check for CVE-2016-2098: Possible remote code execution
|
13
|
+
vulnerability in Action Pack
|
14
|
+
* Issue #193 - Adding a check for CVE-2016-2097: Possible Information Leak
|
15
|
+
Vulnerability in Action View
|
16
|
+
* Issue #192 - Applying PULL REQUEST from @jasnow about RSPEC deprecation
|
17
|
+
warning fix.
|
9
18
|
|
10
19
|
## Version 1.6.1 - codename: Tow Mater (2016-02-24)
|
11
20
|
|
data/KnowledgeBase.md
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# Dawnscanner Knowledge base
|
2
2
|
|
3
|
-
The knowledge base library for dawnscanner version 1.6.
|
3
|
+
The knowledge base library for dawnscanner version 1.6.2 contains 229 security checks.
|
4
4
|
---
|
5
5
|
* Simple Form XSS - 20131129: There is a XSS vulnerability on Simple Form's label, hint and error options. When Simple Form creates a label, hint or error message it marks the text as being HTML safe, even though it may contain HTML tags. In applications where the text of these helpers can be provided by the users, malicious values can be provided and Simple Form will mark it as safe.
|
6
6
|
* [CVE-2004-0755](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0755): The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions.
|
@@ -413,6 +413,12 @@ XML documents with carefully crafted entity expansion strings which can cause th
|
|
413
413
|
* CVE-2016-0752: There is a possible directory traversal and information leak vulnerability in Action View. Applications that pass unverified user input to the render method in a controller may be vulnerable to an information leak vulnerability.
|
414
414
|
* [CVE-2016-0753](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0753): There is a possible input validation circumvention vulnerability in Active Model. Code that uses Active Model based models (including Active Record models) and does not validate user input before passing it to the model can be subject to an attack where specially crafted input will cause the model to skip validations.
|
415
415
|
* CVE-2016-0753: There is a possible input validation circumvention vulnerability in Active Model. Code that uses Active Model based models (including Active Record models) and does not validate user input before passing it to the model can be subject to an attack where specially crafted input will cause the model to skip validations.
|
416
|
+
* [CVE-2016-2097](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2097): Possible Information Leak Vulnerability in Action View. There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all the scenarios.
|
417
|
+
* CVE-2016-2097: Possible Information Leak Vulnerability in Action View. There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all the scenarios.
|
418
|
+
* [CVE-2016-2098](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2098): There is a possible remote code execution vulnerability in Action Pack. Applications that pass unverified user input to the render method in a
|
419
|
+
controller or a view may be vulnerable to a code injection.
|
420
|
+
* CVE-2016-2098: There is a possible remote code execution vulnerability in Action Pack. Applications that pass unverified user input to the render method in a
|
421
|
+
controller or a view may be vulnerable to a code injection.
|
416
422
|
* [OSVDB-105971](http://osvdb.org/show/osvdb/105971): sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body] input is not properly sanitized when handling module names with shell metacharacters. This may allow a context-dependent attacker to execute arbitrary commands.
|
417
423
|
* OSVDB-105971: sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body] input is not properly sanitized when handling module names with shell metacharacters. This may allow a context-dependent attacker to execute arbitrary commands.
|
418
424
|
* [OSVDB-108569](http://osvdb.org/show/osvdb/108569): backup_checksum Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb that is triggered as the program displays password information in plaintext in the process list. This may allow a local attacker to gain access to password information.
|
@@ -435,8 +441,8 @@ XML documents with carefully crafted entity expansion strings which can cause th
|
|
435
441
|
* OSVDB_118830: Doorkeeper Gem for Ruby contains a flaw in lib/doorkeeper/engine.rb. The issue is due to the program storing sensitive information in production logs. This may allow a local attacker to gain access to sensitive information.
|
436
442
|
* [OSVDB_118954](http://osvdb.org/show/osvdb/118954): Ruby on Rails contains a flaw that is triggered when handling a to_json call to ActiveModel::Name, which can cause an infinite loop. This may allow a remote attacker to cause a denial of service.
|
437
443
|
* OSVDB_118954: Ruby on Rails contains a flaw that is triggered when handling a to_json call to ActiveModel::Name, which can cause an infinite loop. This may allow a remote attacker to cause a denial of service.
|
438
|
-
* [OSVDB_119878](http://osvdb.org/show/osvdb/119878):
|
439
|
-
* OSVDB_119878:
|
444
|
+
* [OSVDB_119878](http://osvdb.org/show/osvdb/119878): rest-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked.
|
445
|
+
* OSVDB_119878: rest-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked.
|
440
446
|
* [OSVDB_119927](http://osvdb.org/show/osvdb/119927): http Gem for Ruby contains a flaw related to certificate validation. The issue is due to a failure to call the OpenSSL::SSL::SSLSocket#post_connection_check method, leading to hostnames not being properly verified. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.
|
441
447
|
* OSVDB_119927: http Gem for Ruby contains a flaw related to certificate validation. The issue is due to a failure to call the OpenSSL::SSL::SSLSocket#post_connection_check method, leading to hostnames not being properly verified. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.
|
442
448
|
* [OSVDB_120415](http://osvdb.org/show/osvdb/120415): redcarpet gem for Ruby contains a flaw that allows a cross-site scripting (XSS) attack. This flaw exists because the parse_inline() function in markdown.c does not validate input before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
|
@@ -473,4 +479,4 @@ Setting this to true will essentially strip out any host information.
|
|
473
479
|
This check will analyze the source code looking for the following patterns: XXX, TO_CHECK, CHECKME, CHECK and FIXME
|
474
480
|
|
475
481
|
|
476
|
-
_Last updated:
|
482
|
+
_Last updated: Tue 01 Mar 23:13:46 CET 2016_
|
data/README.md
CHANGED
@@ -24,7 +24,7 @@ box:
|
|
24
24
|
|
25
25
|
---
|
26
26
|
|
27
|
-
dawnscanner version 1.6.
|
27
|
+
dawnscanner version 1.6.2 has 229 security checks loaded in its knowledge
|
28
28
|
base. Most of them are CVE bulletins applying to gems or the ruby interpreter
|
29
29
|
itself. There are also some check coming from Owasp Ruby on Rails cheatsheet.
|
30
30
|
|
data/Rakefile
CHANGED
@@ -96,6 +96,8 @@ task :cve, :name do |t,args|
|
|
96
96
|
file.puts "\t\t\t\t# include RubyVersionCheck"
|
97
97
|
file.puts ""
|
98
98
|
file.puts "\t\t\t\tdef initialize"
|
99
|
+
file.puts "\t\t\t\t\ttitle = \"\""
|
100
|
+
file.puts "\t\t\t\t\tmessage = \"\""
|
99
101
|
file.puts "\t\t\t\tend"
|
100
102
|
file.puts "\t\t\tend"
|
101
103
|
file.puts "\t\tend"
|
@@ -113,11 +115,11 @@ task :cve, :name do |t,args|
|
|
113
115
|
file.puts "\tend"
|
114
116
|
file.puts "\tit \"is reported when the vulnerable gem is detected\" do"
|
115
117
|
file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
|
116
|
-
file.puts "\t\
|
118
|
+
file.puts "\t\texpect(@check.vuln?).to eq(true)"
|
117
119
|
file.puts "\tend"
|
118
120
|
file.puts "\tit \"is not reported when a fixed release is detected\" do"
|
119
121
|
file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
|
120
|
-
file.puts "\t\
|
122
|
+
file.puts "\t\texpect(@check.vuln?).to eq(false)"
|
121
123
|
file.puts "\tend"
|
122
124
|
file.puts "end"
|
123
125
|
end
|
@@ -128,8 +130,8 @@ task :cve, :name do |t,args|
|
|
128
130
|
puts "require \"dawn/kb/#{class_name.downcase}\""
|
129
131
|
puts "it \"must have test for #{name}\" do"
|
130
132
|
puts " sc = kb.find(\"#{name}\")"
|
131
|
-
puts " sc.
|
132
|
-
puts " sc.class.
|
133
|
+
puts " expect(sc).not_to be_nil"
|
134
|
+
puts " expect(sc.class).to eq(Dawn::Kb::#{class_name})"
|
133
135
|
puts "end"
|
134
136
|
|
135
137
|
|
@@ -165,6 +167,8 @@ task :osvdb, :name do |t,args|
|
|
165
167
|
file.puts "\t\t\t\t# include RubyVersionCheck"
|
166
168
|
file.puts ""
|
167
169
|
file.puts "\t\t\t\tdef initialize"
|
170
|
+
file.puts "\t\t\t\t\ttitle = \"\""
|
171
|
+
file.puts "\t\t\t\t\tmessage = \"\""
|
168
172
|
file.puts "\t\t\t\tend"
|
169
173
|
file.puts "\t\t\tend"
|
170
174
|
file.puts "\t\tend"
|
@@ -182,11 +186,11 @@ task :osvdb, :name do |t,args|
|
|
182
186
|
file.puts "\tend"
|
183
187
|
file.puts "\tit \"is reported when the vulnerable gem is detected\" do"
|
184
188
|
file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
|
185
|
-
file.puts "\t\
|
189
|
+
file.puts "\t\texpect(@check.vuln?).to eq(true)"
|
186
190
|
file.puts "\tend"
|
187
191
|
file.puts "\tit \"is not reported when a fixed release is detected\" do"
|
188
192
|
file.puts "\t\t@check.dependencies = [{:name=>\"\", :version=>\"\"}]"
|
189
|
-
file.puts "\t\
|
193
|
+
file.puts "\t\texpect(@check.vuln?).to eq(false)"
|
190
194
|
file.puts "\tend"
|
191
195
|
file.puts "end"
|
192
196
|
end
|
@@ -198,8 +202,8 @@ task :osvdb, :name do |t,args|
|
|
198
202
|
puts "require \"dawn/kb/#{class_name.downcase}\""
|
199
203
|
puts "it \"must have test for #{name}\" do"
|
200
204
|
puts " sc = kb.find(\"#{name}\")"
|
201
|
-
puts " sc.
|
202
|
-
puts " sc.class.
|
205
|
+
puts " expect(sc).not_to be_nil"
|
206
|
+
puts " expect(sc.class).to eq(Dawn::Kb::#{class_name})"
|
203
207
|
puts "end"
|
204
208
|
|
205
209
|
end
|
data/VERSION
CHANGED
@@ -0,0 +1 @@
|
|
1
|
+
61d2f6fed05b1603409cfdff4960482740bb0b0b
|
@@ -0,0 +1,35 @@
|
|
1
|
+
module Dawn
|
2
|
+
module Kb
|
3
|
+
# Automatically created with rake on 2016-03-01
|
4
|
+
class CVE_2016_2097
|
5
|
+
# Include the testing skeleton for this CVE
|
6
|
+
# include PatternMatchCheck
|
7
|
+
include DependencyCheck
|
8
|
+
# include RubyVersionCheck
|
9
|
+
|
10
|
+
def initialize
|
11
|
+
message = "Possible Information Leak Vulnerability in Action View. There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all the scenarios."
|
12
|
+
title = "Possible Information Leak Vulnerability in Action View"
|
13
|
+
super({
|
14
|
+
:title=>title,
|
15
|
+
:name=> "CVE-2016-2097",
|
16
|
+
:cve=>"2016-2097",
|
17
|
+
:osvdb=>"",
|
18
|
+
:cvss=>"",
|
19
|
+
:release_date => Date.new(2016, 2, 29),
|
20
|
+
:cwe=>"",
|
21
|
+
:owasp=>"A9",
|
22
|
+
:applies=>["rails", "sinatra", "padrino"],
|
23
|
+
:kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
24
|
+
:message=>message,
|
25
|
+
:mitigation=>"Please upgrade actionview gem to version 3.2.22.2, 4.1.14.2 or later.",
|
26
|
+
:aux_links=>[]
|
27
|
+
})
|
28
|
+
self.safe_dependencies = [{:name=>"actionview", :version=>['3.2.22.2', '4.0.99', '4.1.14.2', '5.0.0']}]
|
29
|
+
self.save_minor = true
|
30
|
+
self.save_major = true
|
31
|
+
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
module Dawn
|
2
|
+
module Kb
|
3
|
+
# Automatically created with rake on 2016-03-01
|
4
|
+
class CVE_2016_2098
|
5
|
+
# Include the testing skeleton for this CVE
|
6
|
+
# include PatternMatchCheck
|
7
|
+
include DependencyCheck
|
8
|
+
# include RubyVersionCheck
|
9
|
+
|
10
|
+
def initialize
|
11
|
+
message = "There is a possible remote code execution vulnerability in Action Pack. Applications that pass unverified user input to the render method in a
|
12
|
+
controller or a view may be vulnerable to a code injection."
|
13
|
+
title = "Possible remote code execution vulnerability in Action Pack"
|
14
|
+
super({
|
15
|
+
:title=>title,
|
16
|
+
:name=> "CVE-2016-2098",
|
17
|
+
:cve=>"2016-2098",
|
18
|
+
:osvdb=>"",
|
19
|
+
:cvss=>"",
|
20
|
+
:release_date => Date.new(2016, 2, 29),
|
21
|
+
:cwe=>"",
|
22
|
+
:owasp=>"A9",
|
23
|
+
:applies=>["rails", "sinatra", "padrino"],
|
24
|
+
:kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
25
|
+
:message=>message,
|
26
|
+
:mitigation=>"Please upgrade actionpack gem to version 3.2.22.2, 4.1.14.2, 4.2.5.2, 5.0.0 or later.",
|
27
|
+
:aux_links=>[]
|
28
|
+
})
|
29
|
+
self.safe_dependencies = [{:name=>"actionpack", :version=>['3.2.22.2', '4.1.14.2', '4.2.5.2', '5.0.0']}]
|
30
|
+
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
data/lib/dawn/knowledge_base.rb
CHANGED
@@ -264,6 +264,8 @@ require "dawn/kb/cve_2015_8317"
|
|
264
264
|
require "dawn/kb/cve_2016_0751"
|
265
265
|
require "dawn/kb/cve_2016_0752"
|
266
266
|
require "dawn/kb/cve_2016_0753"
|
267
|
+
require "dawn/kb/cve_2016_2097"
|
268
|
+
require "dawn/kb/cve_2016_2098"
|
267
269
|
|
268
270
|
# OSVDB
|
269
271
|
|
@@ -563,6 +565,8 @@ module Dawn
|
|
563
565
|
Dawn::Kb::CVE_2016_0751.new,
|
564
566
|
Dawn::Kb::CVE_2016_0752.new,
|
565
567
|
Dawn::Kb::CVE_2016_0753.new,
|
568
|
+
Dawn::Kb::CVE_2016_2097.new,
|
569
|
+
Dawn::Kb::CVE_2016_2098.new,
|
566
570
|
|
567
571
|
|
568
572
|
# OSVDB Checks are still here since are all about dependencies
|
data/lib/dawn/version.rb
CHANGED
@@ -3,1165 +3,1175 @@ require 'spec_helper'
|
|
3
3
|
describe "The Codesake Dawn knowledge base" do
|
4
4
|
let (:kb) {Dawn::KnowledgeBase.new}
|
5
5
|
it "must not be empty" do
|
6
|
-
kb.all.size.
|
6
|
+
expect(kb.all.size).not_to eq(0)
|
7
7
|
|
8
8
|
end
|
9
9
|
it "must have a find method" do
|
10
|
-
kb.
|
10
|
+
expect(kb).to respond_to(:find)
|
11
11
|
end
|
12
12
|
|
13
13
|
it "must have an all_by_mvc method" do
|
14
|
-
kb.
|
14
|
+
expect(kb).to respond_to(:all_by_mvc)
|
15
15
|
end
|
16
16
|
|
17
17
|
|
18
18
|
it "will return a nil object if it doesn't find a particular security check" do
|
19
|
-
kb.find("A non existant security check name").
|
19
|
+
expect(kb.find("A non existant security check name")).to be_nil
|
20
20
|
end
|
21
21
|
|
22
22
|
it "must have at least a test for sinatra" do
|
23
|
-
kb.all_by_mvc("sinatra").size.
|
23
|
+
expect(kb.all_by_mvc("sinatra").size).to be > 0
|
24
24
|
end
|
25
25
|
|
26
26
|
# KB Content
|
27
27
|
it "must have test for CVE_2013_1855" do
|
28
28
|
sc = kb.find("CVE-2013-1855")
|
29
|
-
sc.
|
30
|
-
sc.class.
|
29
|
+
expect(sc).not_to be_nil
|
30
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1855)
|
31
31
|
end
|
32
32
|
|
33
33
|
|
34
34
|
it "must have test for CVE_2013_0333" do
|
35
35
|
sc = kb.find("CVE-2013-0333")
|
36
|
-
sc.
|
37
|
-
sc.class.
|
36
|
+
expect(sc).not_to be_nil
|
37
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0333)
|
38
38
|
end
|
39
39
|
|
40
40
|
it "must have test for CVE_2013_1857" do
|
41
41
|
sc = kb.find("CVE-2013-1857")
|
42
|
-
sc.
|
43
|
-
sc.class.
|
42
|
+
expect(sc).not_to be_nil
|
43
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1857)
|
44
44
|
end
|
45
45
|
|
46
46
|
it "must have test for CVE_2012_2660" do
|
47
47
|
sc = kb.find("CVE-2012-2660")
|
48
|
-
sc.
|
49
|
-
sc.class.
|
48
|
+
expect(sc).not_to be_nil
|
49
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2660)
|
50
50
|
end
|
51
51
|
it "must have test for CVE_2012_2661" do
|
52
52
|
sc = kb.find("CVE-2012-2661")
|
53
|
-
sc.
|
54
|
-
sc.class.
|
53
|
+
expect(sc).not_to be_nil
|
54
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2661)
|
55
55
|
end
|
56
56
|
it "must have test for CVE_2012_2694" do
|
57
57
|
sc = kb.find("CVE-2012-2694")
|
58
|
-
sc.
|
59
|
-
sc.class.
|
58
|
+
expect(sc).not_to be_nil
|
59
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2694)
|
60
60
|
end
|
61
61
|
it "must have test for CVE_2012_2695" do
|
62
62
|
sc = kb.find("CVE-2012-2695")
|
63
|
-
sc.
|
64
|
-
sc.class.
|
63
|
+
expect(sc).not_to be_nil
|
64
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2695)
|
65
65
|
end
|
66
66
|
it "must have test for CVE_2012_6496" do
|
67
67
|
sc = kb.find("CVE-2012-6496")
|
68
|
-
sc.
|
69
|
-
sc.class.
|
68
|
+
expect(sc).not_to be_nil
|
69
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6496)
|
70
70
|
end
|
71
71
|
it "must have test for CVE_2012_6497" do
|
72
72
|
sc = kb.find("CVE-2012-6496")
|
73
|
-
sc.
|
74
|
-
sc.class.
|
73
|
+
expect(sc).not_to be_nil
|
74
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6496)
|
75
75
|
end
|
76
76
|
|
77
77
|
it "must have test for CVE_2013_0269" do
|
78
78
|
sc = kb.find("CVE-2013-0269")
|
79
|
-
sc.
|
80
|
-
sc.class.
|
79
|
+
expect(sc).not_to be_nil
|
80
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0269)
|
81
81
|
end
|
82
82
|
|
83
83
|
it "must have test for CVE_2013_0155" do
|
84
84
|
sc = kb.find("CVE-2013-0155")
|
85
|
-
sc.
|
86
|
-
sc.class.
|
85
|
+
expect(sc).not_to be_nil
|
86
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0155)
|
87
87
|
end
|
88
88
|
it "must have test for CVE_2011_2931" do
|
89
89
|
sc = kb.find("CVE-2011-2931")
|
90
|
-
sc.
|
91
|
-
sc.class.
|
90
|
+
expect(sc).not_to be_nil
|
91
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2931)
|
92
92
|
end
|
93
93
|
it "must have test for CVE_2012_3465" do
|
94
94
|
sc = kb.find("CVE-2012-3465")
|
95
|
-
sc.
|
96
|
-
sc.class.
|
95
|
+
expect(sc).not_to be_nil
|
96
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_3465)
|
97
97
|
end
|
98
98
|
|
99
99
|
it "must have test for CVE_2013_1854" do
|
100
100
|
sc = kb.find("CVE-2013-1854")
|
101
|
-
sc.
|
102
|
-
sc.class.
|
101
|
+
expect(sc).not_to be_nil
|
102
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1854)
|
103
103
|
end
|
104
104
|
|
105
105
|
it "must have test for CVE_2013_1856" do
|
106
106
|
sc = kb.find("CVE-2013-1856")
|
107
|
-
sc.
|
108
|
-
sc.class.
|
107
|
+
expect(sc).not_to be_nil
|
108
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1856)
|
109
109
|
end
|
110
110
|
|
111
111
|
it "must have test for CVE_2013_0276" do
|
112
112
|
sc = kb.find("CVE-2013-0276")
|
113
|
-
sc.
|
114
|
-
sc.class.
|
113
|
+
expect(sc).not_to be_nil
|
114
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0276)
|
115
115
|
end
|
116
116
|
|
117
117
|
it "must have test for CVE_2013_0277" do
|
118
118
|
sc = kb.find("CVE-2013-0277")
|
119
|
-
sc.
|
120
|
-
sc.class.
|
119
|
+
expect(sc).not_to be_nil
|
120
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0277)
|
121
121
|
end
|
122
122
|
|
123
123
|
it "must have test for CVE_2013_0156" do
|
124
124
|
sc = kb.find("CVE-2013-0156")
|
125
|
-
sc.
|
126
|
-
sc.class.
|
125
|
+
expect(sc).not_to be_nil
|
126
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0156)
|
127
127
|
end
|
128
128
|
|
129
129
|
it "must have test for CVE-2013-2615" do
|
130
130
|
sc = kb.find("CVE-2013-2615")
|
131
|
-
sc.
|
132
|
-
sc.class.
|
131
|
+
expect(sc).not_to be_nil
|
132
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2615)
|
133
133
|
end
|
134
134
|
|
135
135
|
it "must have test for CVE-2013-1875" do
|
136
136
|
sc = kb.find("CVE-2013-1875")
|
137
|
-
sc.
|
138
|
-
sc.class.
|
137
|
+
expect(sc).not_to be_nil
|
138
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1875)
|
139
139
|
end
|
140
140
|
|
141
141
|
it "must have test for CVE-2013-1655" do
|
142
142
|
sc = kb.find("CVE-2013-1655")
|
143
|
-
sc.
|
144
|
-
sc.class.
|
143
|
+
expect(sc).not_to be_nil
|
144
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1655)
|
145
145
|
end
|
146
146
|
it "must have test for CVE-2013-1656" do
|
147
147
|
sc = kb.find("CVE-2013-1656")
|
148
|
-
sc.
|
149
|
-
sc.class.
|
148
|
+
expect(sc).not_to be_nil
|
149
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1656)
|
150
150
|
end
|
151
151
|
|
152
152
|
it "must have test for CVE-2013-0175" do
|
153
153
|
sc = kb.find("CVE-2013-0175")
|
154
|
-
sc.
|
155
|
-
sc.class.
|
154
|
+
expect(sc).not_to be_nil
|
155
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0175)
|
156
156
|
end
|
157
157
|
it "must have test for CVE-2013-0233" do
|
158
158
|
sc = kb.find("CVE-2013-0233")
|
159
|
-
sc.
|
160
|
-
sc.class.
|
159
|
+
expect(sc).not_to be_nil
|
160
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0233)
|
161
161
|
end
|
162
162
|
it "must have test for CVE-2013-0284" do
|
163
163
|
sc = kb.find("CVE-2013-0284")
|
164
|
-
sc.
|
165
|
-
sc.class.
|
164
|
+
expect(sc).not_to be_nil
|
165
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0284)
|
166
166
|
end
|
167
167
|
it "must have test for CVE-2013-0285" do
|
168
168
|
sc = kb.find("CVE-2013-0285")
|
169
|
-
sc.
|
170
|
-
sc.class.
|
169
|
+
expect(sc).not_to be_nil
|
170
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0285)
|
171
171
|
end
|
172
172
|
it "must have test for CVE-2013-1801" do
|
173
173
|
sc = kb.find("CVE-2013-1801")
|
174
|
-
sc.
|
175
|
-
sc.class.
|
174
|
+
expect(sc).not_to be_nil
|
175
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1801)
|
176
176
|
end
|
177
177
|
it "must have test for CVE-2013-1802" do
|
178
178
|
sc = kb.find("CVE-2013-1802")
|
179
|
-
sc.
|
180
|
-
sc.class.
|
179
|
+
expect(sc).not_to be_nil
|
180
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1802)
|
181
181
|
end
|
182
182
|
it "must have test for CVE-2013-1821" do
|
183
183
|
sc = kb.find("CVE-2013-1821")
|
184
|
-
sc.
|
185
|
-
sc.class.
|
184
|
+
expect(sc).not_to be_nil
|
185
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1821)
|
186
186
|
end
|
187
187
|
it "must have test for CVE-2013-1898" do
|
188
188
|
sc = kb.find("CVE-2013-1898")
|
189
|
-
sc.
|
190
|
-
sc.class.
|
189
|
+
expect(sc).not_to be_nil
|
190
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1898)
|
191
191
|
end
|
192
192
|
it "must have test for CVE-2013-1911" do
|
193
193
|
sc = kb.find("CVE-2013-1911")
|
194
|
-
sc.
|
195
|
-
sc.class.
|
194
|
+
expect(sc).not_to be_nil
|
195
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1911)
|
196
196
|
end
|
197
197
|
it "must have test for CVE-2013-1933" do
|
198
198
|
sc = kb.find("CVE-2013-1933")
|
199
|
-
sc.
|
200
|
-
sc.class.
|
199
|
+
expect(sc).not_to be_nil
|
200
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1933)
|
201
201
|
end
|
202
202
|
it "must have test for CVE-2013-1947" do
|
203
203
|
sc = kb.find("CVE-2013-1947")
|
204
|
-
sc.
|
205
|
-
sc.class.
|
204
|
+
expect(sc).not_to be_nil
|
205
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1947)
|
206
206
|
end
|
207
207
|
it "must have test for CVE-2013-1948" do
|
208
208
|
sc = kb.find("CVE-2013-1948")
|
209
|
-
sc.
|
210
|
-
sc.class.
|
209
|
+
expect(sc).not_to be_nil
|
210
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1948)
|
211
211
|
end
|
212
212
|
it "must have test for CVE-2013-2616" do
|
213
213
|
sc = kb.find("CVE-2013-2616")
|
214
|
-
sc.
|
215
|
-
sc.class.
|
214
|
+
expect(sc).not_to be_nil
|
215
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2616)
|
216
216
|
end
|
217
217
|
it "must have test for CVE-2013-2617" do
|
218
218
|
sc = kb.find("CVE-2013-2617")
|
219
|
-
sc.
|
220
|
-
sc.class.
|
219
|
+
expect(sc).not_to be_nil
|
220
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2617)
|
221
221
|
end
|
222
222
|
it "must have test for CVE-2013-3221" do
|
223
223
|
sc = kb.find("CVE-2013-3221")
|
224
|
-
sc.
|
225
|
-
sc.class.
|
224
|
+
expect(sc).not_to be_nil
|
225
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_3221)
|
226
226
|
end
|
227
227
|
|
228
228
|
it "must have test for CVE-2011-0447" do
|
229
229
|
sc = kb.find("CVE-2011-0447")
|
230
|
-
sc.
|
231
|
-
sc.class.
|
230
|
+
expect(sc).not_to be_nil
|
231
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_0447)
|
232
232
|
end
|
233
233
|
|
234
234
|
it "must have test for CVE-2011-3186" do
|
235
235
|
sc = kb.find("CVE-2011-3186")
|
236
|
-
sc.
|
237
|
-
sc.class.
|
236
|
+
expect(sc).not_to be_nil
|
237
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_3186)
|
238
238
|
end
|
239
239
|
it "must have test for CVE-2012-1099" do
|
240
240
|
sc = kb.find("CVE-2012-1099")
|
241
|
-
sc.
|
242
|
-
sc.class.
|
241
|
+
expect(sc).not_to be_nil
|
242
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_1099)
|
243
243
|
end
|
244
244
|
it "must have test for CVE-2012-1241" do
|
245
245
|
sc = kb.find("CVE-2012-1241")
|
246
|
-
sc.
|
247
|
-
sc.class.
|
246
|
+
expect(sc).not_to be_nil
|
247
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_1241)
|
248
248
|
end
|
249
249
|
it "must have test for CVE-2012-2140" do
|
250
250
|
sc = kb.find("CVE-2012-2140")
|
251
|
-
sc.
|
252
|
-
sc.class.
|
251
|
+
expect(sc).not_to be_nil
|
252
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2140)
|
253
253
|
end
|
254
254
|
it "must have test for CVE-2012-5370" do
|
255
255
|
sc = kb.find("CVE-2012-5370")
|
256
|
-
sc.
|
257
|
-
sc.class.
|
256
|
+
expect(sc).not_to be_nil
|
257
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_5370)
|
258
258
|
end
|
259
259
|
it "must have test for CVE-2012-5371" do
|
260
260
|
sc = kb.find("CVE-2012-5371")
|
261
|
-
sc.
|
262
|
-
sc.class.
|
261
|
+
expect(sc).not_to be_nil
|
262
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_5371)
|
263
263
|
end
|
264
264
|
it "must have test for CVE-2011-2197" do
|
265
265
|
sc = kb.find("CVE-2011-2197")
|
266
|
-
sc.
|
267
|
-
sc.class.
|
266
|
+
expect(sc).not_to be_nil
|
267
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2197)
|
268
268
|
end
|
269
269
|
it "must have test for CVE-2011-2932" do
|
270
270
|
sc = kb.find("CVE-2011-2932")
|
271
|
-
sc.
|
272
|
-
sc.class.
|
271
|
+
expect(sc).not_to be_nil
|
272
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2932)
|
273
273
|
end
|
274
274
|
it "must have test for CVE-2012-3463" do
|
275
275
|
sc = kb.find("CVE-2012-3463")
|
276
|
-
sc.
|
277
|
-
sc.class.
|
276
|
+
expect(sc).not_to be_nil
|
277
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_3463)
|
278
278
|
end
|
279
279
|
it "must have test for CVE-2012-3464" do
|
280
280
|
sc = kb.find("CVE-2012-3464")
|
281
|
-
sc.
|
282
|
-
sc.class.
|
281
|
+
expect(sc).not_to be_nil
|
282
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_3464)
|
283
283
|
end
|
284
284
|
it "must have test for CVE-2012-4464" do
|
285
285
|
sc = kb.find("CVE-2012-4464")
|
286
|
-
sc.
|
287
|
-
sc.class.
|
286
|
+
expect(sc).not_to be_nil
|
287
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_4464)
|
288
288
|
end
|
289
289
|
it "must have test for CVE-2012-4466" do
|
290
290
|
sc = kb.find("CVE-2012-4466")
|
291
|
-
sc.
|
292
|
-
sc.class.
|
291
|
+
expect(sc).not_to be_nil
|
292
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_4466)
|
293
293
|
end
|
294
294
|
it "must have test for CVE-2012-4481" do
|
295
295
|
sc = kb.find("CVE-2012-4481")
|
296
|
-
sc.
|
297
|
-
sc.class.
|
296
|
+
expect(sc).not_to be_nil
|
297
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_4481)
|
298
298
|
end
|
299
299
|
it "must have test for CVE-2012-6134" do
|
300
300
|
sc = kb.find("CVE-2012-6134")
|
301
|
-
sc.
|
302
|
-
sc.class.
|
301
|
+
expect(sc).not_to be_nil
|
302
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6134)
|
303
303
|
end
|
304
304
|
it "must have test for CVE-2012-6496" do
|
305
305
|
sc = kb.find("CVE-2012-6496")
|
306
|
-
sc.
|
307
|
-
sc.class.
|
306
|
+
expect(sc).not_to be_nil
|
307
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6496)
|
308
308
|
end
|
309
309
|
|
310
310
|
it "must have test for CVE-2012-6497" do
|
311
311
|
sc = kb.find("CVE-2012-6497")
|
312
|
-
sc.
|
313
|
-
sc.class.
|
312
|
+
expect(sc).not_to be_nil
|
313
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6497)
|
314
314
|
end
|
315
315
|
|
316
316
|
it "must have test for CVE-2010-1330" do
|
317
317
|
sc = kb.find("CVE-2010-1330")
|
318
|
-
sc.
|
319
|
-
sc.class.
|
318
|
+
expect(sc).not_to be_nil
|
319
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2010_1330)
|
320
320
|
end
|
321
321
|
|
322
322
|
it "must have test for CVE-2011-0446" do
|
323
323
|
sc = kb.find("CVE-2011-0446")
|
324
|
-
sc.
|
325
|
-
sc.class.
|
324
|
+
expect(sc).not_to be_nil
|
325
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_0446)
|
326
326
|
end
|
327
327
|
|
328
328
|
it "must have test for CVE-2011-0995" do
|
329
329
|
sc = kb.find("CVE-2011-0995")
|
330
|
-
sc.
|
331
|
-
sc.class.
|
330
|
+
expect(sc).not_to be_nil
|
331
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_0995)
|
332
332
|
end
|
333
333
|
|
334
334
|
it "must have test for CVE-2011-2929" do
|
335
335
|
sc = kb.find("CVE-2011-2929")
|
336
|
-
sc.
|
337
|
-
sc.class.
|
336
|
+
expect(sc).not_to be_nil
|
337
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2929)
|
338
338
|
end
|
339
339
|
|
340
340
|
it "must have test for CVE-2011-4815" do
|
341
341
|
sc = kb.find("CVE-2011-4815")
|
342
|
-
sc.
|
343
|
-
sc.class.
|
342
|
+
expect(sc).not_to be_nil
|
343
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_4815)
|
344
344
|
end
|
345
345
|
|
346
346
|
it "must have test for CVE-2012-3424" do
|
347
347
|
sc = kb.find("CVE-2012-3424")
|
348
|
-
sc.
|
349
|
-
sc.class.
|
348
|
+
expect(sc).not_to be_nil
|
349
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_3424)
|
350
350
|
end
|
351
351
|
|
352
352
|
it "must have test for CVE-2012-5380" do
|
353
353
|
sc = kb.find("CVE-2012-5380")
|
354
|
-
sc.
|
355
|
-
sc.class.
|
354
|
+
expect(sc).not_to be_nil
|
355
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_5380)
|
356
356
|
end
|
357
357
|
|
358
358
|
it "must have test for CVE-2012-4522" do
|
359
359
|
sc = kb.find("CVE-2012-4522")
|
360
|
-
sc.
|
361
|
-
sc.class.
|
360
|
+
expect(sc).not_to be_nil
|
361
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_4522)
|
362
362
|
end
|
363
363
|
it "must have test for CVE-2013-2065" do
|
364
364
|
sc = kb.find("CVE-2013-2065")
|
365
|
-
sc.
|
366
|
-
sc.class.
|
365
|
+
expect(sc).not_to be_nil
|
366
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2065)
|
367
367
|
end
|
368
368
|
it "must have test for CVE-2013-4389" do
|
369
369
|
sc = kb.find("CVE-2013-4389")
|
370
|
-
sc.
|
371
|
-
sc.class.
|
370
|
+
expect(sc).not_to be_nil
|
371
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4389)
|
372
372
|
end
|
373
373
|
|
374
374
|
it "must have test for CVE-2013-4164" do
|
375
375
|
sc = kb.find("CVE-2013-4164")
|
376
|
-
sc.
|
377
|
-
sc.class.
|
376
|
+
expect(sc).not_to be_nil
|
377
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4164)
|
378
378
|
end
|
379
379
|
|
380
380
|
it "must have test for CVE-2013-4562" do
|
381
381
|
sc = kb.find("CVE-2013-4562")
|
382
|
-
sc.
|
383
|
-
sc.class.
|
382
|
+
expect(sc).not_to be_nil
|
383
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4562)
|
384
384
|
end
|
385
385
|
it "must have test for CVE-2013-4457" do
|
386
386
|
sc = kb.find("CVE-2013-4457")
|
387
|
-
sc.
|
388
|
-
sc.class.
|
387
|
+
expect(sc).not_to be_nil
|
388
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4457)
|
389
389
|
end
|
390
390
|
|
391
391
|
it "must have test for 20131129-SimpleForm-Xss" do
|
392
392
|
sc = kb.find("Simple Form XSS - 20131129")
|
393
|
-
sc.
|
394
|
-
sc.class.
|
393
|
+
expect(sc).not_to be_nil
|
394
|
+
expect(sc.class).to eq(Dawn::Kb::SimpleForm_Xss_20131129)
|
395
395
|
end
|
396
396
|
|
397
397
|
it "must have test for CVE-2013-4491" do
|
398
398
|
sc = kb.find("CVE-2013-4491")
|
399
|
-
sc.
|
400
|
-
sc.class.
|
399
|
+
expect(sc).not_to be_nil
|
400
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4491)
|
401
401
|
end
|
402
402
|
|
403
403
|
it "must have test for CVE-2013-4492" do
|
404
404
|
sc = kb.find("CVE-2013-4492")
|
405
|
-
sc.
|
406
|
-
sc.class.
|
405
|
+
expect(sc).not_to be_nil
|
406
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4492)
|
407
407
|
end
|
408
408
|
it "must have test for CVE-2013-6414" do
|
409
409
|
sc = kb.find("CVE-2013-6414")
|
410
|
-
sc.
|
411
|
-
sc.class.
|
410
|
+
expect(sc).not_to be_nil
|
411
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6414)
|
412
412
|
end
|
413
413
|
it "must have test for CVE-2013-6415" do
|
414
414
|
sc = kb.find("CVE-2013-6415")
|
415
|
-
sc.
|
416
|
-
sc.class.
|
415
|
+
expect(sc).not_to be_nil
|
416
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6415)
|
417
417
|
end
|
418
418
|
it "must have test for CVE-2013-6416" do
|
419
419
|
sc = kb.find("CVE-2013-6416")
|
420
|
-
sc.
|
421
|
-
sc.class.
|
420
|
+
expect(sc).not_to be_nil
|
421
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6416)
|
422
422
|
end
|
423
423
|
|
424
424
|
it "must have test for CVE-2013-6417" do
|
425
425
|
sc = kb.find("CVE-2013-6417")
|
426
|
-
sc.
|
427
|
-
sc.class.
|
426
|
+
expect(sc).not_to be_nil
|
427
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6417)
|
428
428
|
end
|
429
429
|
|
430
430
|
it "must have test for CVE-2013-6460" do
|
431
431
|
sc = kb.find("CVE-2013-6460")
|
432
|
-
sc.
|
433
|
-
sc.class.
|
432
|
+
expect(sc).not_to be_nil
|
433
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6460)
|
434
434
|
end
|
435
435
|
it "must have test for CVE-2013-6461" do
|
436
436
|
sc = kb.find("CVE-2013-6461")
|
437
|
-
sc.
|
438
|
-
sc.class.
|
437
|
+
expect(sc).not_to be_nil
|
438
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6461)
|
439
439
|
end
|
440
440
|
it "must have test for CVE-2013-4478" do
|
441
441
|
sc = kb.find("CVE-2013-4478")
|
442
|
-
sc.
|
443
|
-
sc.class.
|
442
|
+
expect(sc).not_to be_nil
|
443
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4478)
|
444
444
|
end
|
445
445
|
it "must have test for CVE-2013-4479" do
|
446
446
|
sc = kb.find("CVE-2013-4479")
|
447
|
-
sc.
|
448
|
-
sc.class.
|
447
|
+
expect(sc).not_to be_nil
|
448
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4479)
|
449
449
|
end
|
450
450
|
it "must have test for CVE-2013-1812" do
|
451
451
|
sc = kb.find("CVE-2013-1812")
|
452
|
-
sc.
|
453
|
-
sc.class.
|
452
|
+
expect(sc).not_to be_nil
|
453
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1812)
|
454
454
|
end
|
455
455
|
it "must have test for CVE-2013-6421" do
|
456
456
|
sc = kb.find("CVE-2013-6421")
|
457
|
-
sc.
|
458
|
-
sc.class.
|
457
|
+
expect(sc).not_to be_nil
|
458
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6421)
|
459
459
|
end
|
460
460
|
|
461
461
|
it "must have test for CVE-2004-0755" do
|
462
462
|
sc = kb.find("CVE-2004-0755")
|
463
|
-
sc.
|
464
|
-
sc.class.
|
463
|
+
expect(sc).not_to be_nil
|
464
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2004_0755)
|
465
465
|
end
|
466
466
|
it "must have test for CVE-2004-0983" do
|
467
467
|
sc = kb.find("CVE-2004-0983")
|
468
|
-
sc.
|
469
|
-
sc.class.
|
468
|
+
expect(sc).not_to be_nil
|
469
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2004_0983)
|
470
470
|
end
|
471
471
|
it "must have test for CVE-2005-1992" do
|
472
472
|
sc = kb.find("CVE-2005-1992")
|
473
|
-
sc.
|
474
|
-
sc.class.
|
473
|
+
expect(sc).not_to be_nil
|
474
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2005_1992)
|
475
475
|
end
|
476
476
|
it "must have test for CVE-2005-2337" do
|
477
477
|
sc = kb.find("CVE-2005-2337")
|
478
|
-
sc.
|
479
|
-
sc.class.
|
478
|
+
expect(sc).not_to be_nil
|
479
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2005_2337)
|
480
480
|
end
|
481
481
|
it "must have test for CVE-2006-1931" do
|
482
482
|
sc = kb.find("CVE-2006-1931")
|
483
|
-
sc.
|
484
|
-
sc.class.
|
483
|
+
expect(sc).not_to be_nil
|
484
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_1931)
|
485
485
|
end
|
486
486
|
it "must have test for CVE-2006-2582" do
|
487
487
|
sc = kb.find("CVE-2006-2582")
|
488
|
-
sc.
|
489
|
-
sc.class.
|
488
|
+
expect(sc).not_to be_nil
|
489
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_2582)
|
490
490
|
end
|
491
491
|
it "must have test for CVE-2006-3694" do
|
492
492
|
sc = kb.find("CVE-2006-3694")
|
493
|
-
sc.
|
494
|
-
sc.class.
|
493
|
+
expect(sc).not_to be_nil
|
494
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_3694)
|
495
495
|
end
|
496
496
|
|
497
497
|
it "must have test for CVE-2006-4112" do
|
498
498
|
sc = kb.find("CVE-2006-4112")
|
499
|
-
sc.
|
500
|
-
sc.class.
|
499
|
+
expect(sc).not_to be_nil
|
500
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_4112)
|
501
501
|
end
|
502
502
|
|
503
503
|
it "must have test for CVE-2006-5467" do
|
504
504
|
sc = kb.find("CVE-2006-5467")
|
505
|
-
sc.
|
506
|
-
sc.class.
|
505
|
+
expect(sc).not_to be_nil
|
506
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_5467)
|
507
507
|
end
|
508
508
|
|
509
509
|
it "must have test for CVE-2006-6303" do
|
510
510
|
sc = kb.find("CVE-2006-6303")
|
511
|
-
sc.
|
512
|
-
sc.class.
|
511
|
+
expect(sc).not_to be_nil
|
512
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_6303)
|
513
513
|
end
|
514
514
|
it "must have test for CVE-2006-6852" do
|
515
515
|
sc = kb.find("CVE-2006-6852")
|
516
|
-
sc.
|
517
|
-
sc.class.
|
516
|
+
expect(sc).not_to be_nil
|
517
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_6852)
|
518
518
|
end
|
519
519
|
it "must have test for CVE-2006-6979" do
|
520
520
|
sc = kb.find("CVE-2006-6979")
|
521
|
-
sc.
|
522
|
-
sc.class.
|
521
|
+
expect(sc).not_to be_nil
|
522
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2006_6979)
|
523
523
|
end
|
524
524
|
it "must have test for CVE-2007-0469" do
|
525
525
|
sc = kb.find("CVE-2007-0469")
|
526
|
-
sc.
|
527
|
-
sc.class.
|
526
|
+
expect(sc).not_to be_nil
|
527
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_0469)
|
528
528
|
end
|
529
529
|
it "must have test for CVE-2013-2090" do
|
530
530
|
sc = kb.find("CVE-2013-2090")
|
531
|
-
sc.
|
532
|
-
sc.class.
|
531
|
+
expect(sc).not_to be_nil
|
532
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2090)
|
533
533
|
end
|
534
534
|
it "must have test for CVE-2011-4319" do
|
535
535
|
sc = kb.find("CVE-2011-4319")
|
536
|
-
sc.
|
537
|
-
sc.class.
|
536
|
+
expect(sc).not_to be_nil
|
537
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_4319)
|
538
538
|
end
|
539
539
|
it "must have test for CVE-2011-3187" do
|
540
540
|
sc = kb.find("CVE-2011-3187")
|
541
|
-
sc.
|
542
|
-
sc.class.
|
541
|
+
expect(sc).not_to be_nil
|
542
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_3187)
|
543
543
|
end
|
544
544
|
it "must have test for CVE-2011-3009" do
|
545
545
|
sc = kb.find("CVE-2011-3009")
|
546
|
-
sc.
|
547
|
-
sc.class.
|
546
|
+
expect(sc).not_to be_nil
|
547
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_3009)
|
548
548
|
end
|
549
549
|
|
550
550
|
it "must have test for CVE-2011-2930" do
|
551
551
|
sc = kb.find("CVE-2011-2930")
|
552
|
-
sc.
|
553
|
-
sc.class.
|
552
|
+
expect(sc).not_to be_nil
|
553
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2930)
|
554
554
|
end
|
555
555
|
|
556
556
|
it "must have test for CVE-2011-2705" do
|
557
557
|
sc = kb.find("CVE-2011-2705")
|
558
|
-
sc.
|
559
|
-
sc.class.
|
558
|
+
expect(sc).not_to be_nil
|
559
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2705)
|
560
560
|
end
|
561
561
|
it "must have test for CVE-2011-2686" do
|
562
562
|
sc = kb.find("CVE-2011-2686")
|
563
|
-
sc.
|
564
|
-
sc.class.
|
563
|
+
expect(sc).not_to be_nil
|
564
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_2686)
|
565
565
|
end
|
566
566
|
it "must have test for CVE-2011-1005" do
|
567
567
|
sc = kb.find("CVE-2011-1005")
|
568
|
-
sc.
|
569
|
-
sc.class.
|
568
|
+
expect(sc).not_to be_nil
|
569
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_1005)
|
570
570
|
end
|
571
571
|
it "must have test for CVE-2011-1004" do
|
572
572
|
sc = kb.find("CVE-2011-1004")
|
573
|
-
sc.
|
574
|
-
sc.class.
|
573
|
+
expect(sc).not_to be_nil
|
574
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_1004)
|
575
575
|
end
|
576
576
|
it "must have test for CVE-2011-0739" do
|
577
577
|
sc = kb.find("CVE-2011-0739")
|
578
|
-
sc.
|
579
|
-
sc.class.
|
578
|
+
expect(sc).not_to be_nil
|
579
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_0739)
|
580
580
|
end
|
581
581
|
it "must have test for CVE-2011-0188" do
|
582
582
|
sc = kb.find("CVE-2011-0188")
|
583
|
-
sc.
|
584
|
-
sc.class.
|
583
|
+
expect(sc).not_to be_nil
|
584
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_0188)
|
585
585
|
end
|
586
586
|
it "must have test for CVE-2010-3933" do
|
587
587
|
sc = kb.find("CVE-2010-3933")
|
588
|
-
sc.
|
589
|
-
sc.class.
|
588
|
+
expect(sc).not_to be_nil
|
589
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2010_3933)
|
590
590
|
end
|
591
591
|
it "must have test for CVE-2010-2489" do
|
592
592
|
sc = kb.find("CVE-2010-2489")
|
593
|
-
sc.
|
594
|
-
sc.class.
|
593
|
+
expect(sc).not_to be_nil
|
594
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2010_2489)
|
595
595
|
end
|
596
596
|
it "must have test for CVE-2009-4214" do
|
597
597
|
sc = kb.find("CVE-2009-4214")
|
598
|
-
sc.
|
599
|
-
sc.class.
|
598
|
+
expect(sc).not_to be_nil
|
599
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2009_4214)
|
600
600
|
end
|
601
601
|
it "must have test for CVE-2009-4124" do
|
602
602
|
sc = kb.find("CVE-2009-4124")
|
603
|
-
sc.
|
604
|
-
sc.class.
|
603
|
+
expect(sc).not_to be_nil
|
604
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2009_4124)
|
605
605
|
end
|
606
606
|
it "must have test for CVE-2009-4078" do
|
607
607
|
sc = kb.find("CVE-2009-4078")
|
608
|
-
sc.
|
609
|
-
sc.class.
|
608
|
+
expect(sc).not_to be_nil
|
609
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2009_4078)
|
610
610
|
end
|
611
611
|
it "must have test for CVE-2008-7248" do
|
612
612
|
sc = kb.find("CVE-2008-7248")
|
613
|
-
sc.
|
614
|
-
sc.class.
|
613
|
+
expect(sc).not_to be_nil
|
614
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_7248)
|
615
615
|
end
|
616
616
|
it "must have test for CVE-2008-5189" do
|
617
617
|
sc = kb.find("CVE-2008-5189")
|
618
|
-
sc.
|
619
|
-
sc.class.
|
618
|
+
expect(sc).not_to be_nil
|
619
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_5189)
|
620
620
|
end
|
621
621
|
it "must have test for CVE-2008-4310" do
|
622
622
|
sc = kb.find("CVE-2008-4310")
|
623
|
-
sc.
|
624
|
-
sc.class.
|
623
|
+
expect(sc).not_to be_nil
|
624
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_4310)
|
625
625
|
end
|
626
626
|
it "must have test for CVE-2008-4094" do
|
627
627
|
sc = kb.find("CVE-2008-4094")
|
628
|
-
sc.
|
629
|
-
sc.class.
|
628
|
+
expect(sc).not_to be_nil
|
629
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_4094)
|
630
630
|
end
|
631
631
|
it "must have test for CVE-2008-3905" do
|
632
632
|
sc = kb.find("CVE-2008-3905")
|
633
|
-
sc.
|
634
|
-
sc.class.
|
633
|
+
expect(sc).not_to be_nil
|
634
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_3905)
|
635
635
|
end
|
636
636
|
it "must have test for CVE-2008-3790" do
|
637
637
|
sc = kb.find("CVE-2008-3790")
|
638
|
-
sc.
|
639
|
-
sc.class.
|
638
|
+
expect(sc).not_to be_nil
|
639
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_3790)
|
640
640
|
end
|
641
641
|
it "must have test for CVE-2008-3657" do
|
642
642
|
sc = kb.find("CVE-2008-3657")
|
643
|
-
sc.
|
644
|
-
sc.class.
|
643
|
+
expect(sc).not_to be_nil
|
644
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_3657)
|
645
645
|
end
|
646
646
|
it "must have test for CVE-2008-3655" do
|
647
647
|
sc = kb.find("CVE-2008-3655")
|
648
|
-
sc.
|
649
|
-
sc.class.
|
648
|
+
expect(sc).not_to be_nil
|
649
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_3655)
|
650
650
|
end
|
651
651
|
it "must have test for CVE-2008-2725" do
|
652
652
|
sc = kb.find("CVE-2008-2725")
|
653
|
-
sc.
|
654
|
-
sc.class.
|
653
|
+
expect(sc).not_to be_nil
|
654
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_2725)
|
655
655
|
end
|
656
656
|
it "must have test for CVE-2008-2663" do
|
657
657
|
sc = kb.find("CVE-2008-2663")
|
658
|
-
sc.
|
659
|
-
sc.class.
|
658
|
+
expect(sc).not_to be_nil
|
659
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_2663)
|
660
660
|
end
|
661
661
|
it "must have test for CVE-2008-2664" do
|
662
662
|
sc = kb.find("CVE-2008-2664")
|
663
|
-
sc.
|
664
|
-
sc.class.
|
663
|
+
expect(sc).not_to be_nil
|
664
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_2664)
|
665
665
|
end
|
666
666
|
it "must have test for CVE-2008-2662" do
|
667
667
|
sc = kb.find("CVE-2008-2662")
|
668
|
-
sc.
|
669
|
-
sc.class.
|
668
|
+
expect(sc).not_to be_nil
|
669
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_2662)
|
670
670
|
end
|
671
671
|
it "must have test for CVE-2008-2376" do
|
672
672
|
sc = kb.find("CVE-2008-2376")
|
673
|
-
sc.
|
674
|
-
sc.class.
|
673
|
+
expect(sc).not_to be_nil
|
674
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_2376)
|
675
675
|
end
|
676
676
|
it "must have test for CVE-2008-1891" do
|
677
677
|
sc = kb.find("CVE-2008-1891")
|
678
|
-
sc.
|
679
|
-
sc.class.
|
678
|
+
expect(sc).not_to be_nil
|
679
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_1891)
|
680
680
|
end
|
681
681
|
it "must have test for CVE-2008-1145" do
|
682
682
|
sc = kb.find("CVE-2008-1145")
|
683
|
-
sc.
|
684
|
-
sc.class.
|
683
|
+
expect(sc).not_to be_nil
|
684
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2008_1145)
|
685
685
|
end
|
686
686
|
it "must have test for CVE-2007-6612" do
|
687
687
|
sc = kb.find("CVE-2007-6612")
|
688
|
-
sc.
|
689
|
-
sc.class.
|
688
|
+
expect(sc).not_to be_nil
|
689
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_6612)
|
690
690
|
end
|
691
691
|
it "must have test for CVE-2007-6077" do
|
692
692
|
sc = kb.find("CVE-2007-6077")
|
693
|
-
sc.
|
694
|
-
sc.class.
|
693
|
+
expect(sc).not_to be_nil
|
694
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_6077)
|
695
695
|
end
|
696
696
|
it "must have test for CVE-2007-5770" do
|
697
697
|
sc = kb.find("CVE-2007-5770")
|
698
|
-
sc.
|
699
|
-
sc.class.
|
698
|
+
expect(sc).not_to be_nil
|
699
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_5770)
|
700
700
|
end
|
701
701
|
it "must have test for CVE-2007-5380" do
|
702
702
|
sc = kb.find("CVE-2007-5380")
|
703
|
-
sc.
|
704
|
-
sc.class.
|
703
|
+
expect(sc).not_to be_nil
|
704
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_5380)
|
705
705
|
end
|
706
706
|
it "must have test for CVE-2007-5379" do
|
707
707
|
sc = kb.find("CVE-2007-5379")
|
708
|
-
sc.
|
709
|
-
sc.class.
|
708
|
+
expect(sc).not_to be_nil
|
709
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_5379)
|
710
710
|
end
|
711
711
|
it "must have test for CVE-2007-5162" do
|
712
712
|
sc = kb.find("CVE-2007-5162")
|
713
|
-
sc.
|
714
|
-
sc.class.
|
713
|
+
expect(sc).not_to be_nil
|
714
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2007_5162)
|
715
715
|
end
|
716
716
|
it "must have test for CVE-2013-2119" do
|
717
717
|
sc = kb.find("CVE-2013-2119")
|
718
|
-
sc.
|
719
|
-
sc.class.
|
718
|
+
expect(sc).not_to be_nil
|
719
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2119)
|
720
720
|
end
|
721
721
|
it "must have test for CVE-2013-7086" do
|
722
722
|
sc = kb.find("CVE-2013-7086")
|
723
|
-
sc.
|
724
|
-
sc.class.
|
723
|
+
expect(sc).not_to be_nil
|
724
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_7086)
|
725
725
|
end
|
726
726
|
it "must have test for CVE-2013-6459" do
|
727
727
|
sc = kb.find("CVE-2013-6459")
|
728
|
-
sc.
|
729
|
-
sc.class.
|
728
|
+
expect(sc).not_to be_nil
|
729
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_6459)
|
730
730
|
end
|
731
731
|
it "must have test for CVE-2013-5647" do
|
732
732
|
sc = kb.find("CVE-2013-5647")
|
733
|
-
sc.
|
734
|
-
sc.class.
|
733
|
+
expect(sc).not_to be_nil
|
734
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_5647)
|
735
735
|
end
|
736
736
|
it "must have test for CVE-2013-0263" do
|
737
737
|
sc = kb.find("CVE-2013-0263")
|
738
|
-
sc.
|
739
|
-
sc.class.
|
738
|
+
expect(sc).not_to be_nil
|
739
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0263)
|
740
740
|
end
|
741
741
|
it "must have test for CVE-2013-0256" do
|
742
742
|
sc = kb.find("CVE-2013-0256")
|
743
|
-
sc.
|
744
|
-
sc.class.
|
743
|
+
expect(sc).not_to be_nil
|
744
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0256)
|
745
745
|
end
|
746
746
|
it "must have test for CVE-2013-0162" do
|
747
747
|
sc = kb.find("CVE-2013-0162")
|
748
|
-
sc.
|
749
|
-
sc.class.
|
748
|
+
expect(sc).not_to be_nil
|
749
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0162)
|
750
750
|
end
|
751
751
|
it "must have test for CVE-2012-2671" do
|
752
752
|
sc = kb.find("CVE-2012-2671")
|
753
|
-
sc.
|
754
|
-
sc.class.
|
753
|
+
expect(sc).not_to be_nil
|
754
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2671)
|
755
755
|
end
|
756
756
|
it "must have test for CVE-2012-2139" do
|
757
757
|
sc = kb.find("CVE-2012-2139")
|
758
|
-
sc.
|
759
|
-
sc.class.
|
758
|
+
expect(sc).not_to be_nil
|
759
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_2139)
|
760
760
|
end
|
761
761
|
it "must have test for CVE-2012-1098" do
|
762
762
|
sc = kb.find("CVE-2012-1098")
|
763
|
-
sc.
|
764
|
-
sc.class.
|
763
|
+
expect(sc).not_to be_nil
|
764
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_1098)
|
765
765
|
end
|
766
766
|
it "must have test for CVE-2013-1756" do
|
767
767
|
sc = kb.find("CVE-2013-1756")
|
768
|
-
sc.
|
769
|
-
sc.class.
|
768
|
+
expect(sc).not_to be_nil
|
769
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1756)
|
770
770
|
end
|
771
771
|
it "must have test for CVE-2014-1233" do
|
772
772
|
sc = kb.find("CVE-2014-1233")
|
773
|
-
sc.
|
774
|
-
sc.class.
|
773
|
+
expect(sc).not_to be_nil
|
774
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_1233)
|
775
775
|
end
|
776
776
|
it "must have test for CVE-2014-1234" do
|
777
777
|
sc = kb.find("CVE-2014-1234")
|
778
|
-
sc.
|
779
|
-
sc.class.
|
778
|
+
expect(sc).not_to be_nil
|
779
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_1234)
|
780
780
|
end
|
781
781
|
it "must have test for CVE-2013-4413" do
|
782
782
|
sc = kb.find("CVE-2013-4413")
|
783
|
-
sc.
|
784
|
-
sc.class.
|
783
|
+
expect(sc).not_to be_nil
|
784
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4413)
|
785
785
|
end
|
786
786
|
|
787
787
|
it "must have test for CVE-2013-4489" do
|
788
788
|
sc = kb.find("CVE-2013-4489")
|
789
|
-
sc.
|
790
|
-
sc.class.
|
789
|
+
expect(sc).not_to be_nil
|
790
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4489)
|
791
791
|
end
|
792
792
|
it "must have test for CVE-2013-5671" do
|
793
793
|
sc = kb.find("CVE-2013-5671")
|
794
|
-
sc.
|
795
|
-
sc.class.
|
794
|
+
expect(sc).not_to be_nil
|
795
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_5671)
|
796
796
|
end
|
797
797
|
it "must have test for CVE-2013-4593" do
|
798
798
|
sc = kb.find("CVE-2013-4593")
|
799
|
-
sc.
|
800
|
-
sc.class.
|
799
|
+
expect(sc).not_to be_nil
|
800
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4593)
|
801
801
|
end
|
802
802
|
it "must have test for CVE-2013-0262" do
|
803
803
|
sc = kb.find("CVE-2013-0262")
|
804
|
-
sc.
|
805
|
-
sc.class.
|
804
|
+
expect(sc).not_to be_nil
|
805
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0262)
|
806
806
|
end
|
807
807
|
it "must have test for CVE-2013-0184" do
|
808
808
|
sc = kb.find("CVE-2013-0184")
|
809
|
-
sc.
|
810
|
-
sc.class.
|
809
|
+
expect(sc).not_to be_nil
|
810
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0184)
|
811
811
|
end
|
812
812
|
it "must have test for CVE-2013-0183" do
|
813
813
|
sc = kb.find("CVE-2013-0183")
|
814
|
-
sc.
|
815
|
-
sc.class.
|
814
|
+
expect(sc).not_to be_nil
|
815
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_0183)
|
816
816
|
end
|
817
817
|
it "must have test for CVE-2012-6109" do
|
818
818
|
sc = kb.find("CVE-2012-6109")
|
819
|
-
sc.
|
820
|
-
sc.class.
|
819
|
+
expect(sc).not_to be_nil
|
820
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6109)
|
821
821
|
end
|
822
822
|
it "must have test for CVE-2011-5036" do
|
823
823
|
sc = kb.find("CVE-2011-5036")
|
824
|
-
sc.
|
825
|
-
sc.class.
|
824
|
+
expect(sc).not_to be_nil
|
825
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2011_5036)
|
826
826
|
end
|
827
827
|
it "must have test for CVE-2013-2516" do
|
828
828
|
sc = kb.find("CVE-2013-2516")
|
829
|
-
sc.
|
830
|
-
sc.class.
|
829
|
+
expect(sc).not_to be_nil
|
830
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2516)
|
831
831
|
end
|
832
832
|
it "must have test for CVE-2013-2513" do
|
833
833
|
sc = kb.find("CVE-2013-2513")
|
834
|
-
sc.
|
835
|
-
sc.class.
|
834
|
+
expect(sc).not_to be_nil
|
835
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2513)
|
836
836
|
end
|
837
837
|
it "must have test for CVE-2013-2512" do
|
838
838
|
sc = kb.find("CVE-2013-2512")
|
839
|
-
sc.
|
840
|
-
sc.class.
|
839
|
+
expect(sc).not_to be_nil
|
840
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2512)
|
841
841
|
end
|
842
842
|
it "must have test for CVE-2013-1607" do
|
843
843
|
sc = kb.find("CVE-2013-1607")
|
844
|
-
sc.
|
845
|
-
sc.class.
|
844
|
+
expect(sc).not_to be_nil
|
845
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_1607)
|
846
846
|
end
|
847
847
|
it "must have test for CVE-2014-0080" do
|
848
848
|
sc = kb.find("CVE-2014-0080")
|
849
|
-
sc.
|
850
|
-
sc.class.
|
849
|
+
expect(sc).not_to be_nil
|
850
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_0080)
|
851
851
|
|
852
852
|
end
|
853
853
|
|
854
854
|
it "must have test for CVE-2014-0081" do
|
855
855
|
sc = kb.find("CVE-2014-0081")
|
856
|
-
sc.
|
857
|
-
sc.class.
|
856
|
+
expect(sc).not_to be_nil
|
857
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_0081)
|
858
858
|
end
|
859
859
|
it "must have test for CVE-2014-0082" do
|
860
860
|
sc = kb.find("CVE-2014-0082")
|
861
|
-
sc.
|
862
|
-
sc.class.
|
861
|
+
expect(sc).not_to be_nil
|
862
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_0082)
|
863
863
|
end
|
864
864
|
it "must have test for CVE-2014-2322" do
|
865
865
|
sc = kb.find("CVE-2014-2322")
|
866
|
-
sc.
|
867
|
-
sc.class.
|
866
|
+
expect(sc).not_to be_nil
|
867
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_2322)
|
868
868
|
end
|
869
869
|
|
870
870
|
it "must have test for CVE-2014-0036" do
|
871
871
|
sc = kb.find("CVE-2014-0036")
|
872
|
-
sc.
|
873
|
-
sc.class.
|
872
|
+
expect(sc).not_to be_nil
|
873
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_0036)
|
874
874
|
end
|
875
875
|
it "must have test for CVE-2014-2538" do
|
876
876
|
sc = kb.find("CVE-2014-2538")
|
877
|
-
sc.
|
878
|
-
sc.class.
|
877
|
+
expect(sc).not_to be_nil
|
878
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_2538)
|
879
879
|
end
|
880
880
|
it "must have test for CVE-2013-4203" do
|
881
881
|
sc = kb.find("CVE-2013-4203")
|
882
|
-
sc.
|
883
|
-
sc.class.
|
882
|
+
expect(sc).not_to be_nil
|
883
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_4203)
|
884
884
|
end
|
885
885
|
it "must have test for CVE-2014-2525" do
|
886
886
|
sc = kb.find("CVE-2014-2525")
|
887
|
-
sc.
|
888
|
-
sc.class.
|
887
|
+
expect(sc).not_to be_nil
|
888
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_2525)
|
889
889
|
end
|
890
890
|
it "must have test for OSVDB_105971" do
|
891
891
|
sc = kb.find("OSVDB-105971")
|
892
|
-
sc.
|
893
|
-
sc.class.
|
892
|
+
expect(sc).not_to be_nil
|
893
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_105971)
|
894
894
|
end
|
895
895
|
|
896
896
|
it "must have test for CVE-2014-0130" do
|
897
897
|
sc = kb.find("CVE-2014-0130")
|
898
|
-
sc.
|
899
|
-
sc.class.
|
898
|
+
expect(sc).not_to be_nil
|
899
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_0130)
|
900
900
|
end
|
901
901
|
it "must have test for CVE-2013-2105" do
|
902
902
|
sc = kb.find("CVE-2013-2105")
|
903
|
-
sc.
|
904
|
-
sc.class.
|
903
|
+
expect(sc).not_to be_nil
|
904
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2013_2105)
|
905
905
|
end
|
906
906
|
it "must have test for OSVDB-108569" do
|
907
907
|
sc = kb.find("OSVDB-108569")
|
908
|
-
sc.
|
909
|
-
sc.class.
|
908
|
+
expect(sc).not_to be_nil
|
909
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_108569)
|
910
910
|
end
|
911
911
|
|
912
912
|
it "must have test for OSVDB-108570" do
|
913
913
|
sc = kb.find("OSVDB-108570")
|
914
|
-
sc.
|
915
|
-
sc.class.
|
914
|
+
expect(sc).not_to be_nil
|
915
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_108570)
|
916
916
|
end
|
917
917
|
|
918
918
|
it "must have test for OSVDB-108530" do
|
919
919
|
sc = kb.find("OSVDB-108530")
|
920
|
-
sc.
|
921
|
-
sc.class.
|
920
|
+
expect(sc).not_to be_nil
|
921
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_108530)
|
922
922
|
end
|
923
923
|
it "must have test for OSVDB-108563" do
|
924
924
|
sc = kb.find("OSVDB-108563")
|
925
|
-
sc.
|
926
|
-
sc.class.
|
925
|
+
expect(sc).not_to be_nil
|
926
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_108563)
|
927
927
|
end
|
928
928
|
|
929
929
|
it "must have test for CVE-2014-3482" do
|
930
930
|
sc = kb.find("CVE-2014-3482")
|
931
|
-
sc.
|
932
|
-
sc.class.
|
931
|
+
expect(sc).not_to be_nil
|
932
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_3482)
|
933
933
|
end
|
934
934
|
|
935
935
|
it "must have test for CVE-2014-3483" do
|
936
936
|
sc = kb.find("CVE-2014-3483")
|
937
|
-
sc.
|
938
|
-
sc.class.
|
937
|
+
expect(sc).not_to be_nil
|
938
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_3483)
|
939
939
|
end
|
940
940
|
it "must have test for OSVDB_119927" do
|
941
941
|
sc = kb.find("OSVDB_119927")
|
942
|
-
sc.
|
943
|
-
sc.class.
|
942
|
+
expect(sc).not_to be_nil
|
943
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_119927)
|
944
944
|
end
|
945
945
|
it "must have test for OSVDB_119878" do
|
946
946
|
sc = kb.find("OSVDB_119878")
|
947
|
-
sc.
|
948
|
-
sc.class.
|
947
|
+
expect(sc).not_to be_nil
|
948
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_119878)
|
949
949
|
end
|
950
950
|
it "must have test for OSVDB_118954" do
|
951
951
|
sc = kb.find("OSVDB_118954")
|
952
|
-
sc.
|
953
|
-
sc.class.
|
952
|
+
expect(sc).not_to be_nil
|
953
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_118954)
|
954
954
|
end
|
955
955
|
it "must have test for OSVDB_118579" do
|
956
956
|
sc = kb.find("OSVDB_118579")
|
957
|
-
sc.
|
958
|
-
sc.class.
|
957
|
+
expect(sc).not_to be_nil
|
958
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_118579)
|
959
959
|
end
|
960
960
|
it "must have test for OSVDB_118830" do
|
961
961
|
sc = kb.find("OSVDB_118830")
|
962
|
-
sc.
|
963
|
-
sc.class.
|
962
|
+
expect(sc).not_to be_nil
|
963
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_118830)
|
964
964
|
end
|
965
965
|
it "must have test for CVE-2015-3224" do
|
966
966
|
sc = kb.find("CVE-2015-3224")
|
967
|
-
sc.
|
968
|
-
sc.class.
|
967
|
+
expect(sc).not_to be_nil
|
968
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_3224)
|
969
969
|
end
|
970
970
|
it "must have test for CVE-2015-3225" do
|
971
971
|
sc = kb.find("CVE-2015-3225")
|
972
|
-
sc.
|
973
|
-
sc.class.
|
972
|
+
expect(sc).not_to be_nil
|
973
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_3225)
|
974
974
|
end
|
975
975
|
it "must have test for CVE-2015-3227" do
|
976
976
|
sc = kb.find("CVE-2015-3227")
|
977
|
-
sc.
|
978
|
-
sc.class.
|
977
|
+
expect(sc).not_to be_nil
|
978
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_3227)
|
979
979
|
end
|
980
980
|
it "must have test for CVE-2015-3226" do
|
981
981
|
sc = kb.find("CVE-2015-3226")
|
982
|
-
sc.
|
983
|
-
sc.class.
|
982
|
+
expect(sc).not_to be_nil
|
983
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_3226)
|
984
984
|
end
|
985
985
|
it "must have test for CVE-2015-2963" do
|
986
986
|
sc = kb.find("CVE-2015-2963")
|
987
|
-
sc.
|
988
|
-
sc.class.
|
987
|
+
expect(sc).not_to be_nil
|
988
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_2963)
|
989
989
|
end
|
990
990
|
it "CVE-2015-1840 can't be tested. Trust me. It works"
|
991
991
|
it "must have test for CVE-2015-3448" do
|
992
992
|
sc = kb.find("CVE-2015-3448")
|
993
|
-
sc.
|
994
|
-
sc.class.
|
993
|
+
expect(sc).not_to be_nil
|
994
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_3448)
|
995
995
|
end
|
996
996
|
it "must have test for CVE-2014-9490" do
|
997
997
|
sc = kb.find("CVE-2014-9490")
|
998
|
-
sc.
|
999
|
-
sc.class.
|
998
|
+
expect(sc).not_to be_nil
|
999
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_9490)
|
1000
1000
|
end
|
1001
1001
|
it "must have test for CVE-2012-6684" do
|
1002
1002
|
sc = kb.find("CVE-2012-6684")
|
1003
|
-
sc.
|
1004
|
-
sc.class.
|
1003
|
+
expect(sc).not_to be_nil
|
1004
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2012_6684)
|
1005
1005
|
end
|
1006
1006
|
it "must have test for CVE-2014-8090" do
|
1007
1007
|
sc = kb.find("CVE-2014-8090")
|
1008
|
-
sc.
|
1009
|
-
sc.class.
|
1008
|
+
expect(sc).not_to be_nil
|
1009
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_8090)
|
1010
1010
|
end
|
1011
1011
|
it "must have test for CVE-2014-7829" do
|
1012
1012
|
sc = kb.find("CVE-2014-7829")
|
1013
|
-
sc.
|
1014
|
-
sc.class.
|
1013
|
+
expect(sc).not_to be_nil
|
1014
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_7829)
|
1015
1015
|
end
|
1016
1016
|
it "must have test for CVE-2014-3916" do
|
1017
1017
|
sc = kb.find("CVE-2014-3916")
|
1018
|
-
sc.
|
1019
|
-
sc.class.
|
1018
|
+
expect(sc).not_to be_nil
|
1019
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_3916)
|
1020
1020
|
end
|
1021
1021
|
it "not sure if it must have check for CVE-2014-3248. Too much gem involved in a single CVE only with ruby 1.9.1 and with social engineering required"
|
1022
1022
|
it "must have test for CVE-2014-4975" do
|
1023
1023
|
sc = kb.find("CVE-2014-4975")
|
1024
|
-
sc.
|
1025
|
-
sc.class.
|
1024
|
+
expect(sc).not_to be_nil
|
1025
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_4975)
|
1026
1026
|
end
|
1027
1027
|
it "must have test for CVE-2014-7819" do
|
1028
1028
|
sc = kb.find("CVE-2014-7819")
|
1029
|
-
sc.
|
1030
|
-
sc.class.
|
1029
|
+
expect(sc).not_to be_nil
|
1030
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_7819)
|
1031
1031
|
end
|
1032
1032
|
it "must have test for CVE-2014-7818" do
|
1033
1033
|
sc = kb.find("CVE-2014-7818")
|
1034
|
-
sc.
|
1035
|
-
sc.class.
|
1034
|
+
expect(sc).not_to be_nil
|
1035
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2014_7818)
|
1036
1036
|
end
|
1037
1037
|
it "must have test for OSVDB_120415" do
|
1038
1038
|
sc = kb.find("OSVDB_120415")
|
1039
|
-
sc.
|
1040
|
-
sc.class.
|
1039
|
+
expect(sc).not_to be_nil
|
1040
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_120415)
|
1041
1041
|
end
|
1042
1042
|
it "must have test for OSVDB_120857" do
|
1043
1043
|
sc = kb.find("OSVDB_120857")
|
1044
|
-
sc.
|
1045
|
-
sc.class.
|
1044
|
+
expect(sc).not_to be_nil
|
1045
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_120857)
|
1046
1046
|
end
|
1047
1047
|
it "must have test for OSVDB_121701" do
|
1048
1048
|
sc = kb.find("OSVDB_121701")
|
1049
|
-
sc.
|
1050
|
-
sc.class.
|
1049
|
+
expect(sc).not_to be_nil
|
1050
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_121701)
|
1051
1051
|
end
|
1052
1052
|
it "must have test for CVE-2015-4020" do
|
1053
1053
|
sc = kb.find("CVE-2015-4020")
|
1054
|
-
sc.
|
1055
|
-
sc.class.
|
1054
|
+
expect(sc).not_to be_nil
|
1055
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_4020)
|
1056
1056
|
end
|
1057
1057
|
it "must have test for OSVDB_117903" do
|
1058
1058
|
sc = kb.find("OSVDB_117903")
|
1059
|
-
sc.
|
1060
|
-
sc.class.
|
1059
|
+
expect(sc).not_to be_nil
|
1060
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_117903)
|
1061
1061
|
end
|
1062
1062
|
it "must have test for OSVDB_115654" do
|
1063
1063
|
sc = kb.find("OSVDB_115654")
|
1064
|
-
sc.
|
1065
|
-
sc.class.
|
1064
|
+
expect(sc).not_to be_nil
|
1065
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_115654)
|
1066
1066
|
end
|
1067
1067
|
it "must have test for OSVDB_116010" do
|
1068
1068
|
sc = kb.find("OSVDB_116010")
|
1069
|
-
sc.
|
1070
|
-
sc.class.
|
1069
|
+
expect(sc).not_to be_nil
|
1070
|
+
expect(sc.class).to eq(Dawn::Kb::OSVDB_116010)
|
1071
1071
|
end
|
1072
1072
|
it "must have test for CVE-2015-1819" do
|
1073
1073
|
sc = kb.find("CVE-2015-1819")
|
1074
|
-
sc.
|
1075
|
-
sc.class.
|
1074
|
+
expect(sc).not_to be_nil
|
1075
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_1819)
|
1076
1076
|
end
|
1077
1077
|
it "must have test for CVE-2015-7576" do
|
1078
1078
|
sc = kb.find("CVE-2015-7576")
|
1079
|
-
sc.
|
1080
|
-
sc.class.
|
1079
|
+
expect(sc).not_to be_nil
|
1080
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7576)
|
1081
1081
|
end
|
1082
1082
|
it "must have test for CVE-2016-0751" do
|
1083
1083
|
sc = kb.find("CVE-2016-0751")
|
1084
|
-
sc.
|
1085
|
-
sc.class.
|
1084
|
+
expect(sc).not_to be_nil
|
1085
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2016_0751)
|
1086
1086
|
end
|
1087
1087
|
it "must have test for CVE-2015-7577" do
|
1088
1088
|
sc = kb.find("CVE-2015-7577")
|
1089
|
-
sc.
|
1090
|
-
sc.class.
|
1089
|
+
expect(sc).not_to be_nil
|
1090
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7577)
|
1091
1091
|
end
|
1092
1092
|
it "must have test for CVE-2015-7579" do
|
1093
1093
|
sc = kb.find("CVE-2015-7579")
|
1094
|
-
sc.
|
1095
|
-
sc.class.
|
1094
|
+
expect(sc).not_to be_nil
|
1095
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7579)
|
1096
1096
|
end
|
1097
1097
|
it "must have test for CVE-2016-0752" do
|
1098
1098
|
sc = kb.find("CVE-2016-0752")
|
1099
|
-
sc.
|
1100
|
-
sc.class.
|
1099
|
+
expect(sc).not_to be_nil
|
1100
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2016_0752)
|
1101
1101
|
end
|
1102
1102
|
it "must have test for CVE-2016-0753" do
|
1103
1103
|
sc = kb.find("CVE-2016-0753")
|
1104
|
-
sc.
|
1105
|
-
sc.class.
|
1104
|
+
expect(sc).not_to be_nil
|
1105
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2016_0753)
|
1106
1106
|
end
|
1107
1107
|
it "must have test for CVE-2015-7578" do
|
1108
1108
|
sc = kb.find("CVE-2015-7578")
|
1109
|
-
sc.
|
1110
|
-
sc.class.
|
1109
|
+
expect(sc).not_to be_nil
|
1110
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7578)
|
1111
1111
|
end
|
1112
1112
|
it "must have test for CVE-2015-7581" do
|
1113
1113
|
sc = kb.find("CVE-2015-7581")
|
1114
|
-
sc.
|
1115
|
-
sc.class.
|
1114
|
+
expect(sc).not_to be_nil
|
1115
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7581)
|
1116
1116
|
end
|
1117
1117
|
it "must have test for CVE-2015-5312" do
|
1118
1118
|
sc = kb.find("CVE-2015-5312")
|
1119
|
-
sc.
|
1120
|
-
sc.class.
|
1119
|
+
expect(sc).not_to be_nil
|
1120
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_5312)
|
1121
1121
|
end
|
1122
1122
|
it "must have test for CVE-2015-7497" do
|
1123
1123
|
sc = kb.find("CVE-2015-7497")
|
1124
|
-
sc.
|
1125
|
-
sc.class.
|
1124
|
+
expect(sc).not_to be_nil
|
1125
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7497)
|
1126
1126
|
end
|
1127
1127
|
it "must have test for CVE-2015-7498" do
|
1128
1128
|
sc = kb.find("CVE-2015-7498")
|
1129
|
-
sc.
|
1130
|
-
sc.class.
|
1129
|
+
expect(sc).not_to be_nil
|
1130
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7498)
|
1131
1131
|
end
|
1132
1132
|
it "must have test for CVE-2015-7499" do
|
1133
1133
|
sc = kb.find("CVE-2015-7499")
|
1134
|
-
sc.
|
1135
|
-
sc.class.
|
1134
|
+
expect(sc).not_to be_nil
|
1135
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7499)
|
1136
1136
|
end
|
1137
1137
|
it "must have test for CVE-2015-7500" do
|
1138
1138
|
sc = kb.find("CVE-2015-7500")
|
1139
|
-
sc.
|
1140
|
-
sc.class.
|
1139
|
+
expect(sc).not_to be_nil
|
1140
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7500)
|
1141
1141
|
end
|
1142
1142
|
it "must have test for CVE-2015-8241" do
|
1143
1143
|
sc = kb.find("CVE-2015-8241")
|
1144
|
-
sc.
|
1145
|
-
sc.class.
|
1144
|
+
expect(sc).not_to be_nil
|
1145
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_8241)
|
1146
1146
|
end
|
1147
1147
|
it "must have test for CVE-2015-8242" do
|
1148
1148
|
sc = kb.find("CVE-2015-8242")
|
1149
|
-
sc.
|
1150
|
-
sc.class.
|
1149
|
+
expect(sc).not_to be_nil
|
1150
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_8242)
|
1151
1151
|
end
|
1152
1152
|
it "must have test for CVE-2015-8317" do
|
1153
1153
|
sc = kb.find("CVE-2015-8317")
|
1154
|
-
sc.
|
1155
|
-
sc.class.
|
1154
|
+
expect(sc).not_to be_nil
|
1155
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_8317)
|
1156
1156
|
end
|
1157
1157
|
it "must have test for CVE-2015-7541" do
|
1158
1158
|
sc = kb.find("CVE-2015-7541")
|
1159
|
-
sc.
|
1160
|
-
sc.class.
|
1159
|
+
expect(sc).not_to be_nil
|
1160
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7541)
|
1161
1161
|
end
|
1162
1162
|
it "must have test for CVE-2015-7519" do
|
1163
1163
|
sc = kb.find("CVE-2015-7519")
|
1164
|
-
sc.
|
1165
|
-
sc.class.
|
1164
|
+
expect(sc).not_to be_nil
|
1165
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2015_7519)
|
1166
|
+
end
|
1167
|
+
it "must have test for CVE-2016-2098" do
|
1168
|
+
sc = kb.find("CVE-2016-2098")
|
1169
|
+
expect(sc).not_to be_nil
|
1170
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2016_2098)
|
1171
|
+
end
|
1172
|
+
it "must have test for CVE-2016-2097" do
|
1173
|
+
sc = kb.find("CVE-2016-2097")
|
1174
|
+
expect(sc).not_to be_nil
|
1175
|
+
expect(sc.class).to eq(Dawn::Kb::CVE_2016_2097)
|
1166
1176
|
end
|
1167
1177
|
end
|