Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test: update e2e fixtures #226

Merged
merged 1 commit into from
Oct 6, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 6 additions & 1 deletion fixtures/locks-e2e/1-Pipfile.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

10 changes: 9 additions & 1 deletion fixtures/locks-e2e/1-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

7 changes: 6 additions & 1 deletion fixtures/locks-e2e/1-poetry.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 1 addition & 2 deletions fixtures/locks-e2e/1-pom.xml.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,6 @@ fixtures/locks-e2e/1-pom.xml: found 5 packages
GHSA-4487-x383-qpph: Possible privilege escalation in org.springframework:spring-core (https://github.com/advisories/GHSA-4487-x383-qpph)
GHSA-45vg-2v73-vm62: Moderate severity vulnerability that affects org.springframework:spring-core (https://github.com/advisories/GHSA-45vg-2v73-vm62)
GHSA-564r-hj7v-mcr5: Spring Framework vulnerable to denial of service via specially crafted SpEL expression (https://github.com/advisories/GHSA-564r-hj7v-mcr5)
GHSA-6v7w-535j-rq5m: Moderate severity vulnerability that affects org.springframework:spring-core (https://github.com/advisories/GHSA-6v7w-535j-rq5m)
GHSA-8crv-49fr-2h6j: Spring Security and Spring Framework may not recognize certain paths that should be protected (https://github.com/advisories/GHSA-8crv-49fr-2h6j)
GHSA-ffvq-7w96-97p7: Denial of Service in Spring Framework (https://github.com/advisories/GHSA-ffvq-7w96-97p7)
GHSA-g5mm-vmx4-3rg7: Improper handling of case sensitivity in Spring Framework (https://github.com/advisories/GHSA-g5mm-vmx4-3rg7)
Expand All @@ -31,4 +30,4 @@ fixtures/locks-e2e/1-pom.xml: found 5 packages
GHSA-rqph-vqwm-22vc: Allocation of Resources Without Limits or Throttling in Spring Framework (https://github.com/advisories/GHSA-rqph-vqwm-22vc)
GHSA-wxqc-pxw9-g2p8: Spring Framework vulnerable to denial of service (https://github.com/advisories/GHSA-wxqc-pxw9-g2p8)

22 known vulnerabilities found in fixtures/locks-e2e/1-pom.xml
21 known vulnerabilities found in fixtures/locks-e2e/1-pom.xml
6 changes: 5 additions & 1 deletion fixtures/locks-e2e/1-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw)
[email protected] is affected by the following vulnerabilities:
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
GHSA-w573-4hg7-7wgq: decode-uri-component vulnerable to Denial of Service (DoS) (https://github.com/advisories/GHSA-w573-4hg7-7wgq)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -52,6 +54,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
GHSA-r8f7-9pfq-mjmv: Improper Certificate Validation in node-sass (https://github.com/advisories/GHSA-r8f7-9pfq-mjmv)
[email protected] is affected by the following vulnerabilities:
GHSA-rp65-9cf3-cjxr: Inefficient Regular Expression Complexity in nth-check (https://github.com/advisories/GHSA-rp65-9cf3-cjxr)
[email protected] is affected by the following vulnerabilities:
GHSA-7fh5-64p2-3v2j: PostCSS line return parsing error (https://github.com/advisories/GHSA-7fh5-64p2-3v2j)
[email protected] is affected by the following vulnerabilities:
GHSA-hrpp-h998-j3pp: qs vulnerable to Prototype Pollution (https://github.com/advisories/GHSA-hrpp-h998-j3pp)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -99,4 +103,4 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

56 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
58 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/2-composer.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion fixtures/locks-e2e/2-go.mod.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ fixtures/locks-e2e/2-go.mod: found 73 packages
golang.org/x/[email protected] is affected by the following vulnerabilities:
GHSA-p782-xgp4-8hr8: golang.org/x/sys/unix has Incorrect privilege reporting in syscall (https://github.com/advisories/GHSA-p782-xgp4-8hr8)
golang.org/x/[email protected] is affected by the following vulnerabilities:
GHSA-69ch-w2m2-3vjp: Denial of service in golang.org/x/text/language (https://github.com/advisories/GHSA-69ch-w2m2-3vjp)
GHSA-69ch-w2m2-3vjp: golang.org/x/text/language Denial of service via crafted Accept-Language header (https://github.com/advisories/GHSA-69ch-w2m2-3vjp)
GHSA-ppp9-7jff-5vj2: golang.org/x/text/language Out-of-bounds Read vulnerability (https://github.com/advisories/GHSA-ppp9-7jff-5vj2)

24 known vulnerabilities found in fixtures/locks-e2e/2-go.mod
7 changes: 6 additions & 1 deletion fixtures/locks-e2e/2-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 7 additions & 1 deletion fixtures/locks-e2e/2-poetry.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion fixtures/locks-e2e/2-pom.xml.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ fixtures/locks-e2e/2-pom.xml: found 8 packages
GHSA-fvm3-cfvj-gxqq: High severity vulnerability that affects commons-fileupload:commons-fileupload (https://github.com/advisories/GHSA-fvm3-cfvj-gxqq)
GHSA-hfrx-6qgj-fp6c: Apache Commons FileUpload denial of service vulnerability (https://github.com/advisories/GHSA-hfrx-6qgj-fp6c)
GHSA-qx6h-9567-5fqw: Arbitrary file write in Apache Commons Fileupload (https://github.com/advisories/GHSA-qx6h-9567-5fqw)
GHSA-xx68-jfcg-xmmf: High severity vulnerability that affects commons-fileupload:commons-fileupload (https://github.com/advisories/GHSA-xx68-jfcg-xmmf)
GHSA-xx68-jfcg-xmmf: Commons FileUpload Denial of service vulnerability (https://github.com/advisories/GHSA-xx68-jfcg-xmmf)
org.jsoup:[email protected] is affected by the following vulnerabilities:
GHSA-48rh-qgjr-xfj6: Improper Neutralization of Input During Web Page Generation in Jsoup (https://github.com/advisories/GHSA-48rh-qgjr-xfj6)
GHSA-gp7f-rwcx-9369: jsoup may not sanitize code injection XSS attempts if SafeList.preserveRelativeLinks is enabled (https://github.com/advisories/GHSA-gp7f-rwcx-9369)
Expand Down
10 changes: 9 additions & 1 deletion fixtures/locks-e2e/2-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -18,12 +18,18 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-fwr7-v2mv-hh25: Prototype Pollution in async (https://github.com/advisories/GHSA-fwr7-v2mv-hh25)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
GHSA-gxpj-cx7g-858c: Regular Expression Denial of Service in debug (https://github.com/advisories/GHSA-gxpj-cx7g-858c)
[email protected] is affected by the following vulnerabilities:
GHSA-w573-4hg7-7wgq: decode-uri-component vulnerable to Denial of Service (DoS) (https://github.com/advisories/GHSA-w573-4hg7-7wgq)
[email protected] is affected by the following vulnerabilities:
GHSA-phwq-j96m-2c2q: ejs template injection vulnerability (https://github.com/advisories/GHSA-phwq-j96m-2c2q)
[email protected] is affected by the following vulnerabilities:
GHSA-6h5x-7c5m-7cr7: Exposure of Sensitive Information in eventsource (https://github.com/advisories/GHSA-6h5x-7c5m-7cr7)
[email protected] is affected by the following vulnerabilities:
GHSA-4q6p-r6v2-jvc5: Chaijs/get-func-name vulnerable to ReDoS (https://github.com/advisories/GHSA-4q6p-r6v2-jvc5)
[email protected] is affected by the following vulnerabilities:
GHSA-ww39-953v-wcq6: glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -73,6 +79,8 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
GHSA-5fw9-fq32-wv5p: OS Command Injection in node-notifier (https://github.com/advisories/GHSA-5fw9-fq32-wv5p)
[email protected] is affected by the following vulnerabilities:
GHSA-rp65-9cf3-cjxr: Inefficient Regular Expression Complexity in nth-check (https://github.com/advisories/GHSA-rp65-9cf3-cjxr)
[email protected] is affected by the following vulnerabilities:
GHSA-7fh5-64p2-3v2j: PostCSS line return parsing error (https://github.com/advisories/GHSA-7fh5-64p2-3v2j)
[email protected] is affected by the following vulnerabilities:
GHSA-hrpp-h998-j3pp: qs vulnerable to Prototype Pollution (https://github.com/advisories/GHSA-hrpp-h998-j3pp)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -105,4 +113,4 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

58 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock
62 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock