| Package | Description |
|---|---|
| com.h3xstream.retirejs.repo |
| Modifier and Type | Method and Description |
|---|---|
List<JsLibraryResult> |
VulnerabilitiesRepository.findByFileContent(String scriptContent)
This search mode will look for literal string specific to the vulnerable libraries.
|
List<JsLibraryResult> |
VulnerabilitiesRepository.findByFilename(String filename)
This search mode will identify the library by there filename.
|
List<JsLibraryResult> |
VulnerabilitiesRepository.findByFunction(String scriptContent)
This search mode will load the script in a sandbox and look for the presence of specific function.
|
List<JsLibraryResult> |
VulnerabilitiesRepository.findByHash(String hash) |
List<JsLibraryResult> |
VulnerabilitiesRepository.findByUri(String uri)
This search mode will identify the vulnerable library base on the full uri.
|
List<JsLibraryResult> |
ScannerFacade.scanHtml(byte[] respBytes,
int offset)
Look for potential script in the HTML code <script src="//cdn.server.com/jquery/1.3.3.7.js"></script>
|
List<JsLibraryResult> |
ScannerFacade.scanPath(String path)
Analyze a script with only its path is available.
|
List<JsLibraryResult> |
ScannerFacade.scanScript(String path,
byte[] respBytes,
int offset)
Analyze script with the JavaScript file is loaded.
|
Copyright © 2018. All rights reserved.