Skip to content

Commit

Permalink
test: update e2e fixtures (#226)
Browse files Browse the repository at this point in the history
  • Loading branch information
G-Rath authored Oct 6, 2023
1 parent 5897794 commit fbbc011
Show file tree
Hide file tree
Showing 11 changed files with 54 additions and 12 deletions.
7 changes: 6 additions & 1 deletion fixtures/locks-e2e/1-Pipfile.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

10 changes: 9 additions & 1 deletion fixtures/locks-e2e/1-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

7 changes: 6 additions & 1 deletion fixtures/locks-e2e/1-poetry.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 1 addition & 2 deletions fixtures/locks-e2e/1-pom.xml.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,6 @@ fixtures/locks-e2e/1-pom.xml: found 5 packages
GHSA-4487-x383-qpph: Possible privilege escalation in org.springframework:spring-core (https://github.com/advisories/GHSA-4487-x383-qpph)
GHSA-45vg-2v73-vm62: Moderate severity vulnerability that affects org.springframework:spring-core (https://github.com/advisories/GHSA-45vg-2v73-vm62)
GHSA-564r-hj7v-mcr5: Spring Framework vulnerable to denial of service via specially crafted SpEL expression (https://github.com/advisories/GHSA-564r-hj7v-mcr5)
GHSA-6v7w-535j-rq5m: Moderate severity vulnerability that affects org.springframework:spring-core (https://github.com/advisories/GHSA-6v7w-535j-rq5m)
GHSA-8crv-49fr-2h6j: Spring Security and Spring Framework may not recognize certain paths that should be protected (https://github.com/advisories/GHSA-8crv-49fr-2h6j)
GHSA-ffvq-7w96-97p7: Denial of Service in Spring Framework (https://github.com/advisories/GHSA-ffvq-7w96-97p7)
GHSA-g5mm-vmx4-3rg7: Improper handling of case sensitivity in Spring Framework (https://github.com/advisories/GHSA-g5mm-vmx4-3rg7)
Expand All @@ -31,4 +30,4 @@ fixtures/locks-e2e/1-pom.xml: found 5 packages
GHSA-rqph-vqwm-22vc: Allocation of Resources Without Limits or Throttling in Spring Framework (https://github.com/advisories/GHSA-rqph-vqwm-22vc)
GHSA-wxqc-pxw9-g2p8: Spring Framework vulnerable to denial of service (https://github.com/advisories/GHSA-wxqc-pxw9-g2p8)

22 known vulnerabilities found in fixtures/locks-e2e/1-pom.xml
21 known vulnerabilities found in fixtures/locks-e2e/1-pom.xml
6 changes: 5 additions & 1 deletion fixtures/locks-e2e/1-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw)
[email protected] is affected by the following vulnerabilities:
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
GHSA-w573-4hg7-7wgq: decode-uri-component vulnerable to Denial of Service (DoS) (https://github.com/advisories/GHSA-w573-4hg7-7wgq)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -52,6 +54,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
GHSA-r8f7-9pfq-mjmv: Improper Certificate Validation in node-sass (https://github.com/advisories/GHSA-r8f7-9pfq-mjmv)
[email protected] is affected by the following vulnerabilities:
GHSA-rp65-9cf3-cjxr: Inefficient Regular Expression Complexity in nth-check (https://github.com/advisories/GHSA-rp65-9cf3-cjxr)
[email protected] is affected by the following vulnerabilities:
GHSA-7fh5-64p2-3v2j: PostCSS line return parsing error (https://github.com/advisories/GHSA-7fh5-64p2-3v2j)
[email protected] is affected by the following vulnerabilities:
GHSA-hrpp-h998-j3pp: qs vulnerable to Prototype Pollution (https://github.com/advisories/GHSA-hrpp-h998-j3pp)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -99,4 +103,4 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

56 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
58 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/2-composer.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion fixtures/locks-e2e/2-go.mod.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ fixtures/locks-e2e/2-go.mod: found 73 packages
golang.org/x/[email protected] is affected by the following vulnerabilities:
GHSA-p782-xgp4-8hr8: golang.org/x/sys/unix has Incorrect privilege reporting in syscall (https://github.com/advisories/GHSA-p782-xgp4-8hr8)
golang.org/x/[email protected] is affected by the following vulnerabilities:
GHSA-69ch-w2m2-3vjp: Denial of service in golang.org/x/text/language (https://github.com/advisories/GHSA-69ch-w2m2-3vjp)
GHSA-69ch-w2m2-3vjp: golang.org/x/text/language Denial of service via crafted Accept-Language header (https://github.com/advisories/GHSA-69ch-w2m2-3vjp)
GHSA-ppp9-7jff-5vj2: golang.org/x/text/language Out-of-bounds Read vulnerability (https://github.com/advisories/GHSA-ppp9-7jff-5vj2)

24 known vulnerabilities found in fixtures/locks-e2e/2-go.mod
7 changes: 6 additions & 1 deletion fixtures/locks-e2e/2-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 7 additions & 1 deletion fixtures/locks-e2e/2-poetry.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion fixtures/locks-e2e/2-pom.xml.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ fixtures/locks-e2e/2-pom.xml: found 8 packages
GHSA-fvm3-cfvj-gxqq: High severity vulnerability that affects commons-fileupload:commons-fileupload (https://github.com/advisories/GHSA-fvm3-cfvj-gxqq)
GHSA-hfrx-6qgj-fp6c: Apache Commons FileUpload denial of service vulnerability (https://github.com/advisories/GHSA-hfrx-6qgj-fp6c)
GHSA-qx6h-9567-5fqw: Arbitrary file write in Apache Commons Fileupload (https://github.com/advisories/GHSA-qx6h-9567-5fqw)
GHSA-xx68-jfcg-xmmf: High severity vulnerability that affects commons-fileupload:commons-fileupload (https://github.com/advisories/GHSA-xx68-jfcg-xmmf)
GHSA-xx68-jfcg-xmmf: Commons FileUpload Denial of service vulnerability (https://github.com/advisories/GHSA-xx68-jfcg-xmmf)
org.jsoup:[email protected] is affected by the following vulnerabilities:
GHSA-48rh-qgjr-xfj6: Improper Neutralization of Input During Web Page Generation in Jsoup (https://github.com/advisories/GHSA-48rh-qgjr-xfj6)
GHSA-gp7f-rwcx-9369: jsoup may not sanitize code injection XSS attempts if SafeList.preserveRelativeLinks is enabled (https://github.com/advisories/GHSA-gp7f-rwcx-9369)
Expand Down
10 changes: 9 additions & 1 deletion fixtures/locks-e2e/2-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -18,12 +18,18 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
GHSA-w573-4hg7-7wgq: decode-uri-component vulnerable to Denial of Service (DoS) (https://github.com/advisories/GHSA-w573-4hg7-7wgq)
[email protected] is affected by the following vulnerabilities:
GHSA-phwq-j96m-2c2q: ejs template injection vulnerability (https://github.com/advisories/GHSA-phwq-j96m-2c2q)
[email protected] is affected by the following vulnerabilities:
GHSA-6h5x-7c5m-7cr7: Exposure of Sensitive Information in eventsource (https://github.com/advisories/GHSA-6h5x-7c5m-7cr7)
[email protected] is affected by the following vulnerabilities:
GHSA-4q6p-r6v2-jvc5: Chaijs/get-func-name vulnerable to ReDoS (https://github.com/advisories/GHSA-4q6p-r6v2-jvc5)
[email protected] is affected by the following vulnerabilities:
GHSA-ww39-953v-wcq6: glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -73,6 +79,8 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
GHSA-5fw9-fq32-wv5p: OS Command Injection in node-notifier (https://github.com/advisories/GHSA-5fw9-fq32-wv5p)
[email protected] is affected by the following vulnerabilities:
GHSA-rp65-9cf3-cjxr: Inefficient Regular Expression Complexity in nth-check (https://github.com/advisories/GHSA-rp65-9cf3-cjxr)
[email protected] is affected by the following vulnerabilities:
GHSA-7fh5-64p2-3v2j: PostCSS line return parsing error (https://github.com/advisories/GHSA-7fh5-64p2-3v2j)
[email protected] is affected by the following vulnerabilities:
GHSA-hrpp-h998-j3pp: qs vulnerable to Prototype Pollution (https://github.com/advisories/GHSA-hrpp-h998-j3pp)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -105,4 +113,4 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

58 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock
62 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock

0 comments on commit fbbc011

Please sign in to comment.