@@ -107,6 +107,7 @@ def test_parse_file_with_multiple_vuln_in_version(self):
107
107
self .assertNotEqual ("Info" , finding .severity ) # it is a vulnerability so not 'Info'
108
108
self .assertEqual ("WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation" , finding .title )
109
109
self .assertEqual ("fixed in : 4.6.4" , finding .mitigation )
110
+ self .assertEqual (True , finding .fix_available )
110
111
self .assertEqual ("" , finding .get_scanner_confidence_text ()) # data are => 100%
111
112
112
113
def test_parse_file_issue5774 (self ):
@@ -123,6 +124,7 @@ def test_parse_file_issue5774(self):
123
124
self .assertNotEqual ("Info" , finding .severity )
124
125
self .assertEqual ("All in One SEO Pack <= 2.9.1.1 - Authenticated Stored Cross-Site Scripting (XSS)" , finding .title )
125
126
self .assertEqual ("fixed in : 2.10" , finding .mitigation )
127
+ self .assertEqual (True , finding .fix_available )
126
128
self .assertEqual (7 , finding .scanner_confidence )
127
129
self .assertEqual ("Tentative" , finding .get_scanner_confidence_text ()) # data are at 30%
128
130
with self .subTest (i = 19 ):
@@ -137,6 +139,7 @@ def test_parse_file_issue5774(self):
137
139
self .assertNotEqual ("Info" , finding .severity )
138
140
self .assertEqual ("All in One SEO Pack <= 2.9.1.1 - Authenticated Stored Cross-Site Scripting (XSS)" , finding .title )
139
141
self .assertEqual ("fixed in : 2.10" , finding .mitigation )
142
+ self .assertEqual (True , finding .fix_available )
140
143
self .assertEqual ("Tentative" , finding .get_scanner_confidence_text ()) # data are at 30%
141
144
142
145
with self .subTest (i = 50 ):
0 commit comments