Skip to content

Commit

Permalink
test: update e2e fixtures (#230)
Browse files Browse the repository at this point in the history
  • Loading branch information
G-Rath authored Oct 20, 2023
1 parent 4f6728d commit 35d7b9a
Show file tree
Hide file tree
Showing 10 changed files with 36 additions and 10 deletions.
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/1-Pipfile.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 2 additions & 1 deletion fixtures/locks-e2e/1-composer.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 3 additions & 1 deletion fixtures/locks-e2e/1-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 3 additions & 1 deletion fixtures/locks-e2e/1-poetry.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 3 additions & 1 deletion fixtures/locks-e2e/1-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages

@actions/[email protected] is affected by the following vulnerabilities:
GHSA-7r3h-m5j6-3q42: @actions/core has Delimiter Injection Vulnerability in exportVariable (https://github.com/advisories/GHSA-7r3h-m5j6-3q42)
@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
[email protected] is affected by the following vulnerabilities:
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -103,4 +105,4 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

58 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
59 known vulnerabilities found in fixtures/locks-e2e/1-yarn.lock
3 changes: 2 additions & 1 deletion fixtures/locks-e2e/2-go.mod.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ fixtures/locks-e2e/2-go.mod: found 73 packages
GHSA-69cg-p879-7622: golang.org/x/net/http2 Denial of Service vulnerability (https://github.com/advisories/GHSA-69cg-p879-7622)
GHSA-83g2-8m93-v3w7: golang.org/x/net/html Infinite Loop vulnerability (https://github.com/advisories/GHSA-83g2-8m93-v3w7)
GHSA-h86h-8ppg-mxmh: golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion (https://github.com/advisories/GHSA-h86h-8ppg-mxmh)
GHSA-qppj-fm5r-hxr3: swift-nio-http2 vulnerable to HTTP/2 Stream Cancellation Attack (https://github.com/advisories/GHSA-qppj-fm5r-hxr3)
GHSA-vvpx-j8f3-3w6h: Uncontrolled Resource Consumption (https://github.com/advisories/GHSA-vvpx-j8f3-3w6h)
GO-2022-0288: Unbounded memory growth in net/http and golang.org/x/net/http2
GO-2022-1144: Excessive memory growth in net/http and golang.org/x/net/http2
Expand All @@ -37,4 +38,4 @@ fixtures/locks-e2e/2-go.mod: found 73 packages
GHSA-69ch-w2m2-3vjp: golang.org/x/text/language Denial of service via crafted Accept-Language header (https://github.com/advisories/GHSA-69ch-w2m2-3vjp)
GHSA-ppp9-7jff-5vj2: golang.org/x/text/language Out-of-bounds Read vulnerability (https://github.com/advisories/GHSA-ppp9-7jff-5vj2)

25 known vulnerabilities found in fixtures/locks-e2e/2-go.mod
26 known vulnerabilities found in fixtures/locks-e2e/2-go.mod
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/2-package-lock.json.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 3 additions & 1 deletion fixtures/locks-e2e/2-poetry.lock.out.txt

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

12 changes: 11 additions & 1 deletion fixtures/locks-e2e/2-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,16 @@ Loaded the following OSV databases:
fixtures/locks-e2e/2-yarn.lock: found 1991 packages
Using db npm (%% vulnerabilities, including withdrawn - last updated %%)

@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
@cypress/[email protected] is affected by the following vulnerabilities:
GHSA-p8p7-x288-28g6: Server-Side Request Forgery in Request (https://github.com/advisories/GHSA-p8p7-x288-28g6)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -113,4 +123,4 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages
[email protected] is affected by the following vulnerabilities:
GHSA-j8xg-fqg3-53r7: word-wrap vulnerable to Regular Expression Denial of Service (https://github.com/advisories/GHSA-j8xg-fqg3-53r7)

62 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock
67 known vulnerabilities found in fixtures/locks-e2e/2-yarn.lock
4 changes: 3 additions & 1 deletion fixtures/locks-e2e/3-yarn.lock.out.txt
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,8 @@ Loaded the following OSV databases:
fixtures/locks-e2e/3-yarn.lock: found 1225 packages
Using db npm (%% vulnerabilities, including withdrawn - last updated %%)

@babel/[email protected] is affected by the following vulnerabilities:
GHSA-67hx-6x53-jw92: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code (https://github.com/advisories/GHSA-67hx-6x53-jw92)
[email protected] is affected by the following vulnerabilities:
GHSA-93q8-gq69-wqmw: Inefficient Regular Expression Complexity in chalk/ansi-regex (https://github.com/advisories/GHSA-93q8-gq69-wqmw)
[email protected] is affected by the following vulnerabilities:
Expand Down Expand Up @@ -91,4 +93,4 @@ fixtures/locks-e2e/3-yarn.lock: found 1225 packages
[email protected] is affected by the following vulnerabilities:
GHSA-p9pc-299p-vxgp: yargs-parser Vulnerable to Prototype Pollution (https://github.com/advisories/GHSA-p9pc-299p-vxgp)

48 known vulnerabilities found in fixtures/locks-e2e/3-yarn.lock
49 known vulnerabilities found in fixtures/locks-e2e/3-yarn.lock

0 comments on commit 35d7b9a

Please sign in to comment.