@@ -341,6 +341,12 @@ nodes
341
341
| tst.js:347:20:347:36 | document.___location |
342
342
| tst.js:349:5:349:30 | getUrl( ... ring(1) |
343
343
| tst.js:349:5:349:30 | getUrl( ... ring(1) |
344
+ | tst.js:354:7:354:39 | target |
345
+ | tst.js:354:16:354:32 | document.___location |
346
+ | tst.js:354:16:354:32 | document.___location |
347
+ | tst.js:354:16:354:39 | documen ... .search |
348
+ | tst.js:355:12:355:17 | target |
349
+ | tst.js:355:12:355:17 | target |
344
350
| typeahead.js:20:13:20:45 | target |
345
351
| typeahead.js:20:22:20:38 | document.___location |
346
352
| typeahead.js:20:22:20:38 | document.___location |
@@ -659,6 +665,11 @@ edges
659
665
| tst.js:347:20:347:36 | document.___location | tst.js:349:5:349:30 | getUrl( ... ring(1) |
660
666
| tst.js:347:20:347:36 | document.___location | tst.js:349:5:349:30 | getUrl( ... ring(1) |
661
667
| tst.js:347:20:347:36 | document.___location | tst.js:349:5:349:30 | getUrl( ... ring(1) |
668
+ | tst.js:354:7:354:39 | target | tst.js:355:12:355:17 | target |
669
+ | tst.js:354:7:354:39 | target | tst.js:355:12:355:17 | target |
670
+ | tst.js:354:16:354:32 | document.___location | tst.js:354:16:354:39 | documen ... .search |
671
+ | tst.js:354:16:354:32 | document.___location | tst.js:354:16:354:39 | documen ... .search |
672
+ | tst.js:354:16:354:39 | documen ... .search | tst.js:354:7:354:39 | target |
662
673
| typeahead.js:20:13:20:45 | target | typeahead.js:21:12:21:17 | target |
663
674
| typeahead.js:20:22:20:38 | document.___location | typeahead.js:20:22:20:45 | documen ... .search |
664
675
| typeahead.js:20:22:20:38 | document.___location | typeahead.js:20:22:20:45 | documen ... .search |
@@ -760,6 +771,7 @@ edges
760
771
| tst.js:319:35:319:42 | ___location | tst.js:319:35:319:42 | ___location | tst.js:319:35:319:42 | ___location | Cross-site scripting vulnerability due to $@. | tst.js:319:35:319:42 | ___location | user-provided value |
761
772
| tst.js:336:18:336:35 | params.get('name') | tst.js:330:18:330:34 | document.___location | tst.js:336:18:336:35 | params.get('name') | Cross-site scripting vulnerability due to $@. | tst.js:330:18:330:34 | document.___location | user-provided value |
762
773
| tst.js:349:5:349:30 | getUrl( ... ring(1) | tst.js:347:20:347:36 | document.___location | tst.js:349:5:349:30 | getUrl( ... ring(1) | Cross-site scripting vulnerability due to $@. | tst.js:347:20:347:36 | document.___location | user-provided value |
774
+ | tst.js:355:12:355:17 | target | tst.js:354:16:354:32 | document.___location | tst.js:355:12:355:17 | target | Cross-site scripting vulnerability due to $@. | tst.js:354:16:354:32 | document.___location | user-provided value |
763
775
| typeahead.js:25:18:25:20 | val | typeahead.js:20:22:20:38 | document.___location | typeahead.js:25:18:25:20 | val | Cross-site scripting vulnerability due to $@. | typeahead.js:20:22:20:38 | document.___location | user-provided value |
764
776
| v-html.vue:2:8:2:23 | v-html=tainted | v-html.vue:6:42:6:58 | document.___location | v-html.vue:2:8:2:23 | v-html=tainted | Cross-site scripting vulnerability due to $@. | v-html.vue:6:42:6:58 | document.___location | user-provided value |
765
777
| winjs.js:3:43:3:49 | tainted | winjs.js:2:17:2:33 | document.___location | winjs.js:3:43:3:49 | tainted | Cross-site scripting vulnerability due to $@. | winjs.js:2:17:2:33 | document.___location | user-provided value |
0 commit comments