46 | 46 |
its(:cve_urls) { should eql %w[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11] }
|
47 | 47 |
|
48 | 48 |
its(:secunia_ids) { should eql %w[12] }
|
49 | |
its(:secunia_urls) { should eql %w[https://secunia.com/advisories/12/] }
|
|
49 |
its(:secunia_urls) { should eql %w[https://secuniaresearch.flexerasoftware.com/advisories/12/] }
|
50 | 50 |
|
51 | 51 |
its(:osvdb_ids) { should eql %w[13] }
|
52 | 52 |
its(:osvdb_urls) { should eql %w[http://osvdb.org/show/osvdb/13] }
|
|
68 | 68 |
its(:references_urls) do
|
69 | 69 |
should eql [
|
70 | 70 |
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11',
|
71 | |
'https://secunia.com/advisories/12/',
|
|
71 |
'https://secuniaresearch.flexerasoftware.com/advisories/12/',
|
72 | 72 |
'http://osvdb.org/show/osvdb/13',
|
73 | 73 |
'https://www.exploit-db.com/exploits/14/',
|
74 | 74 |
'single-url',
|
|
80 | 80 |
end
|
81 | 81 |
|
82 | 82 |
context 'when references provided as array' do
|
83 | |
xit
|
|
83 |
let(:references) do
|
|
84 |
{
|
|
85 |
cve: [10, 11],
|
|
86 |
secunia: [20, 21],
|
|
87 |
osvdb: [30, 31],
|
|
88 |
exploitdb: [40, 41],
|
|
89 |
url: %w[single-url another-url],
|
|
90 |
metasploit: %w[/exploit/yolo exploit/aa],
|
|
91 |
packetstorm: [50, 51],
|
|
92 |
securityfocus: [60, 61]
|
|
93 |
}
|
|
94 |
end
|
|
95 |
|
|
96 |
its(:cves) { should eql %w[10 11] }
|
|
97 |
its(:cve_urls) do
|
|
98 |
should eql %w[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-10
|
|
99 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11]
|
|
100 |
end
|
|
101 |
|
|
102 |
its(:secunia_ids) { should eql %w[20 21] }
|
|
103 |
its(:secunia_urls) do
|
|
104 |
should eql %w[https://secuniaresearch.flexerasoftware.com/advisories/20/
|
|
105 |
https://secuniaresearch.flexerasoftware.com/advisories/21/]
|
|
106 |
end
|
|
107 |
|
|
108 |
its(:osvdb_ids) { should eql %w[30 31] }
|
|
109 |
its(:osvdb_urls) do
|
|
110 |
should eql %w[http://osvdb.org/show/osvdb/30
|
|
111 |
http://osvdb.org/show/osvdb/31]
|
|
112 |
end
|
|
113 |
|
|
114 |
its(:exploitdb_ids) { should eql %w[40 41] }
|
|
115 |
its(:exploitdb_urls) do
|
|
116 |
should eql %w[https://www.exploit-db.com/exploits/40/
|
|
117 |
https://www.exploit-db.com/exploits/41/]
|
|
118 |
end
|
|
119 |
|
|
120 |
its(:urls) { should eql %w[single-url another-url] }
|
|
121 |
|
|
122 |
its(:msf_modules) { should eql %w[/exploit/yolo exploit/aa] }
|
|
123 |
its(:msf_urls) do
|
|
124 |
should eql %w[https://www.rapid7.com/db/modules/exploit/yolo
|
|
125 |
https://www.rapid7.com/db/modules/exploit/aa]
|
|
126 |
end
|
|
127 |
|
|
128 |
its(:packetstorm_ids) { should eq %w[50 51] }
|
|
129 |
its(:packetstorm_urls) do
|
|
130 |
should eql %w[http://packetstormsecurity.com/files/50/
|
|
131 |
http://packetstormsecurity.com/files/51/]
|
|
132 |
end
|
|
133 |
|
|
134 |
its(:securityfocus_ids) { should eq %w[60 61] }
|
|
135 |
its(:securityfocus_urls) do
|
|
136 |
should eql %w[http://www.securityfocus.com/bid/60/
|
|
137 |
http://www.securityfocus.com/bid/61/]
|
|
138 |
end
|
|
139 |
|
|
140 |
its(:references_urls) do
|
|
141 |
should eql [
|
|
142 |
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-10',
|
|
143 |
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11',
|
|
144 |
'https://secuniaresearch.flexerasoftware.com/advisories/20/',
|
|
145 |
'https://secuniaresearch.flexerasoftware.com/advisories/21/',
|
|
146 |
'http://osvdb.org/show/osvdb/30',
|
|
147 |
'http://osvdb.org/show/osvdb/31',
|
|
148 |
'https://www.exploit-db.com/exploits/40/',
|
|
149 |
'https://www.exploit-db.com/exploits/41/',
|
|
150 |
'single-url',
|
|
151 |
'another-url',
|
|
152 |
'https://www.rapid7.com/db/modules/exploit/yolo',
|
|
153 |
'https://www.rapid7.com/db/modules/exploit/aa',
|
|
154 |
'http://packetstormsecurity.com/files/50/',
|
|
155 |
'http://packetstormsecurity.com/files/51/',
|
|
156 |
'http://www.securityfocus.com/bid/60/',
|
|
157 |
'http://www.securityfocus.com/bid/61/'
|
|
158 |
]
|
|
159 |
end
|
84 | 160 |
end
|
85 | 161 |
end
|
86 | 162 |
end
|