java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByFileContent(java.lang.String scriptContent) |
This search mode will look for literal string specific to the vulnerable libraries.
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByFilename(java.lang.String filename) |
This search mode will identify the library by there filename.
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByFunction(java.lang.String scriptContent) |
This search mode will load the script in a sandbox and look for the presence of specific function.
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByHash(java.lang.String hash) |
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByUri(java.lang.String uri) |
This search mode will identify the vulnerable library base on the full uri.
|
java.util.List<JsLibraryResult> |
ScannerFacade.scanHtml(byte[] respBytes,
int offset) |
Look for potential script in the HTML code <script src="//cdn.server.com/jquery/1.3.3.7.js"></script>
|
java.util.List<JsLibraryResult> |
ScannerFacade.scanPath(java.lang.String path) |
Analyze a script with only its path is available.
|
java.util.List<JsLibraryResult> |
ScannerFacade.scanScript(java.lang.String path,
byte[] respBytes,
int offset) |
Analyze script with the JavaScript file is loaded.
|