Skip to content

Commit

Permalink
test: regenerate e2e fixtures (#232)
Browse files Browse the repository at this point in the history
  • Loading branch information
G-Rath authored Oct 29, 2023
1 parent 766e079 commit 962af1d
Show file tree
Hide file tree
Showing 6 changed files with 18 additions and 6 deletions.
6 changes: 5 additions & 1 deletion fixtures/locks-e2e/1-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 3 additions & 1 deletion fixtures/locks-e2e/1-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw)
[email protected] is affected by the following vulnerabilities:
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-x9w5-v3q2-3rhw: browserify-sign upper bound check issue in `dsaVerify` leads to a signature forgery attack (https://github.com/advisories/GHSA-x9w5-v3q2-3rhw)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -105,4 +107,4 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

59 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
60 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/2-go.mod.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -37,5 +37,7 @@ fixtures/locks-e2e/2-go.mod: found 73 packages
golang.org/x/[email protected] is affected by the following vulnerabilities:
GHSA-69ch-w2m2-3vjp: golang.org/x/text/language Denial of service via crafted Accept-Language header (https://github.com/advisories/GHSA-69ch-w2m2-3vjp)
GHSA-ppp9-7jff-5vj2: golang.org/x/text/language Out-of-bounds Read vulnerability (https://github.com/advisories/GHSA-ppp9-7jff-5vj2)
google.golang.org/[email protected] is affected by the following vulnerabilities:
GHSA-m425-mq94-257g: gRPC-Go HTTP/2 Rapid Reset vulnerability (https://github.com/advisories/GHSA-m425-mq94-257g)

26 known vulnerabilities found in fixtures/locks-e2e/2-go.mod
27 known vulnerabilities found in fixtures/locks-e2e/2-go.mod
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/2-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 2 additions & 1 deletion fixtures/locks-e2e/2-pom.xml.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ fixtures/locks-e2e/2-pom.xml: found 8 packages
GHSA-m72m-mhq2-9p6c: Uncaught Exception in jsoup (https://github.com/advisories/GHSA-m72m-mhq2-9p6c)
org.owasp.esapi:[email protected] is affected by the following vulnerabilities:
GHSA-2g56-7jv7-wxxq: Missing Cryptographic Step in OWASP Enterprise Security API for Java (https://github.com/advisories/GHSA-2g56-7jv7-wxxq)
GHSA-7c2q-5qmr-v76q: DoS vulnerabilities persist in ESAPI file uploads despite remediation of CVE-2023-24998 (https://github.com/advisories/GHSA-7c2q-5qmr-v76q)
GHSA-8m5h-hrqm-pxm2: Path traversal in the OWASP Enterprise Security API (https://github.com/advisories/GHSA-8m5h-hrqm-pxm2)
GHSA-q77q-vx4q-xx6q: Cross-site Scripting in org.owasp.esapi:esapi (https://github.com/advisories/GHSA-q77q-vx4q-xx6q)

11 known vulnerabilities found in fixtures/locks-e2e/2-pom.xml
12 known vulnerabilities found in fixtures/locks-e2e/2-pom.xml
3 changes: 2 additions & 1 deletion fixtures/locks-e2e/2-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,8 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-x9w5-v3q2-3rhw: browserify-sign upper bound check issue in `dsaVerify` leads to a signature forgery attack (https://github.com/advisories/GHSA-x9w5-v3q2-3rhw)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -68,7 +70,6 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
[email protected] is affected by the following vulnerabilities:
GHSA-29mw-wpgm-hmr9: Regular Expression Denial of Service (ReDoS) in lodash (https://github.com/advisories/GHSA-29mw-wpgm-hmr9)
GHSA-35jh-r3h4-6jhm: Command Injection in lodash (https://github.com/advisories/GHSA-35jh-r3h4-6jhm)
GHSA-p6mc-m468-83gw: Prototype Pollution in lodash (https://github.com/advisories/GHSA-p6mc-m468-83gw)
[email protected] is affected by the following vulnerabilities:
GHSA-f8q6-p94x-37v3: minimatch ReDoS vulnerability (https://github.com/advisories/GHSA-f8q6-p94x-37v3)
[email protected] is affected by the following vulnerabilities:
Expand Down

0 comments on commit 962af1d

Please sign in to comment.