|
1 | 1 | edges
|
2 |
| -| ReflectedXss.go:11:15:11:20 | selection of Form : Values | ReflectedXss.go:14:44:14:51 | username | |
| 2 | +| ReflectedXss.go:12:15:12:20 | selection of Form : Values | ReflectedXss.go:15:44:15:51 | username | |
3 | 3 | | contenttype.go:11:11:11:16 | selection of Form : Values | contenttype.go:17:11:17:22 | type conversion |
|
4 | 4 | | contenttype.go:49:11:49:16 | selection of Form : Values | contenttype.go:53:34:53:37 | data |
|
5 | 5 | | contenttype.go:63:10:63:28 | call to FormValue : string | contenttype.go:64:52:64:55 | data |
|
|
15 | 15 | | websocketXss.go:50:3:50:10 | definition of gorilla2 : slice type | websocketXss.go:52:24:52:31 | gorilla2 |
|
16 | 16 | | websocketXss.go:54:3:54:38 | ... := ...[1] : slice type | websocketXss.go:55:24:55:31 | gorilla3 |
|
17 | 17 | nodes
|
18 |
| -| ReflectedXss.go:11:15:11:20 | selection of Form : Values | semmle.label | selection of Form : Values | |
19 |
| -| ReflectedXss.go:14:44:14:51 | username | semmle.label | username | |
| 18 | +| ReflectedXss.go:12:15:12:20 | selection of Form : Values | semmle.label | selection of Form : Values | |
| 19 | +| ReflectedXss.go:15:44:15:51 | username | semmle.label | username | |
20 | 20 | | contenttype.go:11:11:11:16 | selection of Form : Values | semmle.label | selection of Form : Values |
|
21 | 21 | | contenttype.go:17:11:17:22 | type conversion | semmle.label | type conversion |
|
22 | 22 | | contenttype.go:49:11:49:16 | selection of Form : Values | semmle.label | selection of Form : Values |
|
|
46 | 46 | | websocketXss.go:54:3:54:38 | ... := ...[1] : slice type | semmle.label | ... := ...[1] : slice type |
|
47 | 47 | | websocketXss.go:55:24:55:31 | gorilla3 | semmle.label | gorilla3 |
|
48 | 48 | #select
|
49 |
| -| ReflectedXss.go:14:44:14:51 | username | ReflectedXss.go:11:15:11:20 | selection of Form : Values | ReflectedXss.go:14:44:14:51 | username | Cross-site scripting vulnerability due to $@. | ReflectedXss.go:11:15:11:20 | selection of Form | user-provided value | |
| 49 | +| ReflectedXss.go:15:44:15:51 | username | ReflectedXss.go:12:15:12:20 | selection of Form : Values | ReflectedXss.go:15:44:15:51 | username | Cross-site scripting vulnerability due to $@. | ReflectedXss.go:12:15:12:20 | selection of Form | user-provided value | |
50 | 50 | | contenttype.go:17:11:17:22 | type conversion | contenttype.go:11:11:11:16 | selection of Form : Values | contenttype.go:17:11:17:22 | type conversion | Cross-site scripting vulnerability due to $@. | contenttype.go:11:11:11:16 | selection of Form | user-provided value |
|
51 | 51 | | contenttype.go:53:34:53:37 | data | contenttype.go:49:11:49:16 | selection of Form : Values | contenttype.go:53:34:53:37 | data | Cross-site scripting vulnerability due to $@. | contenttype.go:49:11:49:16 | selection of Form | user-provided value |
|
52 | 52 | | contenttype.go:64:52:64:55 | data | contenttype.go:63:10:63:28 | call to FormValue : string | contenttype.go:64:52:64:55 | data | Cross-site scripting vulnerability due to $@. | contenttype.go:63:10:63:28 | call to FormValue | user-provided value |
|
|
0 commit comments