| Package | Description |
|---|---|
| com.h3xstream.retirejs.repo |
| Modifier and Type | Method and Description |
|---|---|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByFileContent(java.lang.String scriptContent)
This search mode will look for literal string specific to the vulnerable libraries.
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByFilename(java.lang.String filename)
This search mode will identify the library by there filename.
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByFunction(java.lang.String scriptContent)
This search mode will load the script in a sandbox and look for the presence of specific function.
|
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByHash(java.lang.String hash) |
java.util.List<JsLibraryResult> |
VulnerabilitiesRepository.findByUri(java.lang.String uri)
This search mode will identify the vulnerable library base on the full uri.
|
java.util.List<JsLibraryResult> |
ScannerFacade.scanHtml(byte[] respBytes,
int offset)
Look for potential script in the HTML code <script src="//cdn.server.com/jquery/1.3.3.7.js"></script>
|
java.util.List<JsLibraryResult> |
ScannerFacade.scanPath(java.lang.String path)
Analyze a script with only its path is available.
|
java.util.List<JsLibraryResult> |
ScannerFacade.scanScript(java.lang.String path,
byte[] respBytes,
int offset)
Analyze script with the JavaScript file is loaded.
|
Copyright © 2021. All rights reserved.