From 1b5f8f9125ebcfb8a371f619e4e028d5f7b8b99d Mon Sep 17 00:00:00 2001 From: Mohamed Elyousfi Date: Mon, 24 Feb 2025 11:50:00 +0000 Subject: [PATCH] Refactor some cves --- tests/exploits/cve_2021_22941_test.py | 2 +- tests/exploits/cve_2023_1389_test.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/tests/exploits/cve_2021_22941_test.py b/tests/exploits/cve_2021_22941_test.py index ad9c82c..68d3aa3 100644 --- a/tests/exploits/cve_2021_22941_test.py +++ b/tests/exploits/cve_2021_22941_test.py @@ -33,7 +33,7 @@ def testCVE_2021_22941_whenVulnerable_reportFinding( assert ( vulnerability.entry.title - == "Improper Access Control in Citrix ShareFile storage zones controller" + == "Improper Access Control in Citrix ShareFile storage zones controller." ) assert ( vulnerability.technical_detail diff --git a/tests/exploits/cve_2023_1389_test.py b/tests/exploits/cve_2023_1389_test.py index 563298a..bf26f09 100644 --- a/tests/exploits/cve_2023_1389_test.py +++ b/tests/exploits/cve_2023_1389_test.py @@ -30,7 +30,7 @@ def testCVE20231389_whenVulnerable_reportFinding( assert len(vulnerabilities) > 0 vulnerability = vulnerabilities[0] - assert vulnerability.entry.title == "Remote Code Execution in TP-Link AX21" + assert vulnerability.entry.title == "Remote Code Execution in TP-Link AX21." assert ( vulnerability.technical_detail == "https://109.239.246.106:10443/ is vulnerable to CVE-2023-1389, Remote Code Execution in TP-Link AX21."