You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: test_data/expected_reports/bower.xml
+8-114
Original file line number
Diff line number
Diff line change
@@ -1,125 +1,19 @@
1
1
<?xml version="1.0" encoding="UTF-8"?>
2
-
<testsuitename="auditjs.security.bower"errors="0"tests="1"package="test"id=""skipped="0"failures="1"><testcasename="angular"><failuremessage="Found 8 vulnerabilities. See stacktrace for details.">Details:
2
+
<testsuitename="auditjs.security.bower"errors="0"tests="1"package="test"id=""skipped="0"failures="1"><testcasename="vor-test-project-bower-please-ignore-1"><failuremessage="Found 1 vulnerabilities. See stacktrace for details.">Details:
3
3
4
4
[
5
5
{
6
-
"id": 8398878757,
7
-
"title": "Cross Site Scripting (XSS) in JSONP",
8
-
"description": "JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.",
6
+
"id": 8402907551,
7
+
"title": "Test vulnerability, please ignore",
8
+
"description": "This is a test vulnerability for a test project",
"title": "UI Redress Attack Through Improper Sanitization Of SVG Elements",
36
-
"description": "angular is susceptible to UI redress attacks. The vulnerability is due to the lack of proper sanitisation of an html input string by stripping all potentially dangerous tokens. So, an attacker can place svg elements outside of the containing element, leading to rendering it over other elements on the page (example: a login link).",
"title": "Cross Site Scripting (XSS) through use elements referencing external SVG",
68
-
"description": "> The use element can reference external svg's (same origin) and can include\nxlink javascript urls or foreign object that can execute xss.\n> \n> -- [github.com](https://github.com/angular/angular.js/pull/13453)",
"description": "> Affected versions of the package are vulnerable to Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes.\n> \n> -- [snyk.io](https://snyk.io/vuln/npm:angular:20150807)",
"description": "> Affected versions of the package are vulnerable to Mutation Cross-site Scripting (mXSS).\n> \n> -- [snyk.io](https://snyk.io/vuln/npm:angular:20150909)",
"description": "> Affected versions of the package are vulnerable to Cross-site Scripting (XSS) attacks involving assignment on constructor properties.\n> \n> -- [snyk](https://snyk.io/vuln/npm:angular:20151130)",
<testsuitename="auditjs.security.package"errors="0"tests="9"package="test"id=""skipped="0"failures="1"><testcasename="requirejs"/><testcasename="requirejs-plugins"/><testcasename="bootswatch-scss"/><testcasename="angular"><failuremessage="Found 10 vulnerabilities. See stacktrace for details.">[
2
+
<testsuitename="auditjs.security.package"errors="0"tests="1"package="test"id=""skipped="0"failures="1"><testcasename="vor-test-project-npm-please-ignore-1"><failuremessage="Found 1 vulnerabilities. See stacktrace for details.">[
3
3
{
4
-
"id": 8398878757,
5
-
"title": "Cross Site Scripting (XSS) in JSONP",
6
-
"description": "JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.",
4
+
"id": 8402907551,
5
+
"title": "Test vulnerability, please ignore",
6
+
"description": "This is a test vulnerability for a test project",
"title": "UI Redress Attack Through Improper Sanitization Of SVG Elements",
34
-
"description": "angular is susceptible to UI redress attacks. The vulnerability is due to the lack of proper sanitisation of an html input string by stripping all potentially dangerous tokens. So, an attacker can place svg elements outside of the containing element, leading to rendering it over other elements on the page (example: a login link).",
"title": "Cross Site Scripting (XSS) when loaded from an extension",
66
-
"description": "> Extension URIs (`resource://...`) bypass Content-Security-Policy in Chrome and Firefox and can always be loaded. Now if a site already has a XSS bug, and uses CSP to protect itself, but the user has an extension installed that uses Angular, an attacke[r] can load Angular from the extension, and Angular's auto-bootstrapping can be used to bypass the victim site's CSP protection.\n> \n> -- [github.com](https://github.com/angular/angular.js/pull/15346)",
"title": "Cross Site Scripting (XSS) through use elements referencing external SVG",
83
-
"description": "> The use element can reference external svg's (same origin) and can include\nxlink javascript urls or foreign object that can execute xss.\n> \n> -- [github.com](https://github.com/angular/angular.js/pull/13453)",
"description": "> Affected versions of the package are vulnerable to Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes.\n> \n> -- [snyk.io](https://snyk.io/vuln/npm:angular:20150807)",
"description": "> Affected versions of the package are vulnerable to Mutation Cross-site Scripting (mXSS).\n> \n> -- [snyk.io](https://snyk.io/vuln/npm:angular:20150909)",
"description": "> Affected versions of the package are vulnerable to Cross-site Scripting (XSS) attacks involving assignment on constructor properties.\n> \n> -- [snyk](https://snyk.io/vuln/npm:angular:20151130)",
"description": "> Affected versions of the package are vulnerable to Cross-site Scripting (XSS) due to the usemap attribute not being blacklisted.\n> \n> -- [snyk.io](https://snyk.io/vuln/npm:angular:20160122)",
0 commit comments