-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
test: regenerate e2e fixtures (#232)
- Loading branch information
Showing
6 changed files
with
18 additions
and
6 deletions.
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,6 +12,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages | |
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-x9w5-v3q2-3rhw: browserify-sign upper bound check issue in `dsaVerify` leads to a signature forgery attack (https://github.com/advisories/GHSA-x9w5-v3q2-3rhw) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
@@ -105,4 +107,4 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7) | ||
|
||
59 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock | ||
60 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -37,5 +37,7 @@ fixtures/locks-e2e/2-go.mod: found 73 packages | |
golang.org/x/[email protected] is affected by the following vulnerabilities: | ||
GHSA-69ch-w2m2-3vjp: golang.org/x/text/language Denial of service via crafted Accept-Language header (https://github.com/advisories/GHSA-69ch-w2m2-3vjp) | ||
GHSA-ppp9-7jff-5vj2: golang.org/x/text/language Out-of-bounds Read vulnerability (https://github.com/advisories/GHSA-ppp9-7jff-5vj2) | ||
google.golang.org/[email protected] is affected by the following vulnerabilities: | ||
GHSA-m425-mq94-257g: gRPC-Go HTTP/2 Rapid Reset vulnerability (https://github.com/advisories/GHSA-m425-mq94-257g) | ||
|
||
26 known vulnerabilities found in fixtures/locks-e2e/2-go.mod | ||
27 known vulnerabilities found in fixtures/locks-e2e/2-go.mod |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -16,7 +16,8 @@ fixtures/locks-e2e/2-pom.xml: found 8 packages | |
GHSA-m72m-mhq2-9p6c: Uncaught Exception in jsoup (https://github.com/advisories/GHSA-m72m-mhq2-9p6c) | ||
org.owasp.esapi:[email protected] is affected by the following vulnerabilities: | ||
GHSA-2g56-7jv7-wxxq: Missing Cryptographic Step in OWASP Enterprise Security API for Java (https://github.com/advisories/GHSA-2g56-7jv7-wxxq) | ||
GHSA-7c2q-5qmr-v76q: DoS vulnerabilities persist in ESAPI file uploads despite remediation of CVE-2023-24998 (https://github.com/advisories/GHSA-7c2q-5qmr-v76q) | ||
GHSA-8m5h-hrqm-pxm2: Path traversal in the OWASP Enterprise Security API (https://github.com/advisories/GHSA-8m5h-hrqm-pxm2) | ||
GHSA-q77q-vx4q-xx6q: Cross-site Scripting in org.owasp.esapi:esapi (https://github.com/advisories/GHSA-q77q-vx4q-xx6q) | ||
|
||
11 known vulnerabilities found in fixtures/locks-e2e/2-pom.xml | ||
12 known vulnerabilities found in fixtures/locks-e2e/2-pom.xml |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -28,6 +28,8 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages | |
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-x9w5-v3q2-3rhw: browserify-sign upper bound check issue in `dsaVerify` leads to a signature forgery attack (https://github.com/advisories/GHSA-x9w5-v3q2-3rhw) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
@@ -68,7 +70,6 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-29mw-wpgm-hmr9: Regular Expression Denial of Service (ReDoS) in lodash (https://github.com/advisories/GHSA-29mw-wpgm-hmr9) | ||
GHSA-35jh-r3h4-6jhm: Command Injection in lodash (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) | ||
GHSA-p6mc-m468-83gw: Prototype Pollution in lodash (https://github.com/advisories/GHSA-p6mc-m468-83gw) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-f8q6-p94x-37v3: minimatch ReDoS vulnerability (https://github.com/advisories/GHSA-f8q6-p94x-37v3) | ||
[email protected] is affected by the following vulnerabilities: | ||
|