add model for jwt-decode

This commit is contained in:
Erik Krogh Kristensen
2020-11-09 15:56:32 +01:00
parent 1e048d8045
commit 6732493377
4 changed files with 44 additions and 0 deletions

View File

@@ -125,6 +125,13 @@ nodes
| jquery.js:16:38:16:52 | window.location |
| jquery.js:16:38:16:52 | window.location |
| jquery.js:16:38:16:63 | window. ... tring() |
| jwt.js:4:36:4:39 | data |
| jwt.js:4:36:4:39 | data |
| jwt.js:5:9:5:34 | decoded |
| jwt.js:5:19:5:34 | jwt_decode(data) |
| jwt.js:5:30:5:33 | data |
| jwt.js:6:14:6:20 | decoded |
| jwt.js:6:14:6:20 | decoded |
| nodemailer.js:13:11:13:69 | `Hi, yo ... sage}.` |
| nodemailer.js:13:11:13:69 | `Hi, yo ... sage}.` |
| nodemailer.js:13:50:13:66 | req.query.message |
@@ -720,6 +727,12 @@ edges
| jquery.js:16:38:16:52 | window.location | jquery.js:16:38:16:63 | window. ... tring() |
| jquery.js:16:38:16:63 | window. ... tring() | jquery.js:16:19:16:64 | decodeU ... ring()) |
| jquery.js:16:38:16:63 | window. ... tring() | jquery.js:16:19:16:64 | decodeU ... ring()) |
| jwt.js:4:36:4:39 | data | jwt.js:5:30:5:33 | data |
| jwt.js:4:36:4:39 | data | jwt.js:5:30:5:33 | data |
| jwt.js:5:9:5:34 | decoded | jwt.js:6:14:6:20 | decoded |
| jwt.js:5:9:5:34 | decoded | jwt.js:6:14:6:20 | decoded |
| jwt.js:5:19:5:34 | jwt_decode(data) | jwt.js:5:9:5:34 | decoded |
| jwt.js:5:30:5:33 | data | jwt.js:5:19:5:34 | jwt_decode(data) |
| nodemailer.js:13:50:13:66 | req.query.message | nodemailer.js:13:11:13:69 | `Hi, yo ... sage}.` |
| nodemailer.js:13:50:13:66 | req.query.message | nodemailer.js:13:11:13:69 | `Hi, yo ... sage}.` |
| nodemailer.js:13:50:13:66 | req.query.message | nodemailer.js:13:11:13:69 | `Hi, yo ... sage}.` |
@@ -1165,4 +1178,5 @@ edges
| winjs.js:2:17:2:40 | documen ... .search | winjs.js:2:17:2:53 | documen ... ring(1) |
| winjs.js:2:17:2:53 | documen ... ring(1) | winjs.js:2:7:2:53 | tainted |
#select
| jwt.js:6:14:6:20 | decoded | jwt.js:4:36:4:39 | data | jwt.js:6:14:6:20 | decoded | Cross-site scripting vulnerability due to $@. | jwt.js:4:36:4:39 | data | user-provided value |
| typeahead.js:10:16:10:18 | loc | typeahead.js:9:28:9:30 | loc | typeahead.js:10:16:10:18 | loc | Cross-site scripting vulnerability due to $@. | typeahead.js:9:28:9:30 | loc | user-provided value |