Skip to content

Commit 8207a32

Browse files
committed
Fix tests
Signed-off-by: Tushar Goel <tushar.goel.dav@gmail.com>
1 parent 75cb25e commit 8207a32

File tree

2 files changed

+34
-34
lines changed

2 files changed

+34
-34
lines changed

vulnerabilities/tests/test_data/nginx/security_advisories-importer-expected.json

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -971,6 +971,39 @@
971971
"date_published": null,
972972
"weaknesses": []
973973
},
974+
{
975+
"unique_content_id": "8f54462a45ac49635f660b6fb755d5e05cdbc34ebaa565e38ca20c522579ce7f",
976+
"summary": "Vulnerabilities with Windows 8.3 filename pseudonyms",
977+
"affected_packages": [
978+
{
979+
"package": {
980+
"name": "nginx",
981+
"type": "nginx",
982+
"subpath": "",
983+
"version": "",
984+
"namespace": "",
985+
"qualifiers": "os=windows"
986+
},
987+
"fixed_version": "0.8.33",
988+
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
989+
},
990+
{
991+
"package": {
992+
"name": "nginx",
993+
"type": "nginx",
994+
"subpath": "",
995+
"version": "",
996+
"namespace": "",
997+
"qualifiers": "os=windows"
998+
},
999+
"fixed_version": "0.7.65",
1000+
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
1001+
}
1002+
],
1003+
"references": [],
1004+
"date_published": null,
1005+
"weaknesses": []
1006+
},
9741007
{
9751008
"unique_content_id": "92ce767b8cea36271d33c119cb6f706f64f5aba7335cca6791eca90a87f48de1",
9761009
"summary": "Vulnerabilities with Windows file default stream",
@@ -1503,39 +1536,6 @@
15031536
"date_published": null,
15041537
"weaknesses": []
15051538
},
1506-
{
1507-
"unique_content_id": "cd771d4c853d0a5fd6bbc62866fe638c0b41f21f600889447bbaf3b6cd4bad7b",
1508-
"summary": "Vulnerabilities with Windows 8.3 filename pseudonyms",
1509-
"affected_packages": [
1510-
{
1511-
"package": {
1512-
"name": "nginx",
1513-
"type": "nginx",
1514-
"subpath": "",
1515-
"version": "",
1516-
"namespace": "",
1517-
"qualifiers": "os=windows"
1518-
},
1519-
"fixed_version": "0.8.33",
1520-
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
1521-
},
1522-
{
1523-
"package": {
1524-
"name": "nginx",
1525-
"type": "nginx",
1526-
"subpath": "",
1527-
"version": "",
1528-
"namespace": "",
1529-
"qualifiers": "os=windows"
1530-
},
1531-
"fixed_version": "0.7.65",
1532-
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
1533-
}
1534-
],
1535-
"references": [],
1536-
"date_published": null,
1537-
"weaknesses": []
1538-
},
15391539
{
15401540
"unique_content_id": "de7a819f87c93c708251b734406d2b9916fce494ab3987be40ca37426b0c2044",
15411541
"summary": "Buffer underflow vulnerability",

vulnerabilities/tests/test_data/openssl/security_advisories-importer-expected.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3614,7 +3614,7 @@
36143614
"weaknesses": []
36153615
},
36163616
{
3617-
"unique_content_id": "c160af01903483f7380e4bbecd41bc2346069c1c931eb2be9cc45643daf51937",
3617+
"unique_content_id": "4ee23c143c0a01cd7035e1646adaf2222725ad2c96447ffc524eb79d1ac532dd",
36183618
"summary": "OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade. Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE (CVE-2014-3566). See also https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 and https://www.openssl.org/~bodo/ssl-poodle.pdf",
36193619
"affected_packages": [
36203620
{

0 commit comments

Comments
 (0)