-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How does the support for finding vulnerabilities in JavaScript libraries work?
There is a huge amount of JavaScript libraries out there, for use on the web. This greatly simplifies development, but it also means that you need to stay up-to-date on security fixes. "Using Components with Known Vulnerabilities" is now a part of the OWASP Top 10 (External link) list of security risks and insecure libraries can pose a huge risk to your Web applications. One of the goals for our web application scanner is to help you detect the use of JS-library versions with known vulnerabilities.
Our Web Application Scanner helps you detect vulnerable JavaScript components.
Our web application scanner has the capability to scan and find vulnerabilities in most JavaScript libraries. Here is a few examples of the most common ones:
- Eember.js
- Bootstrap
- AngularJS
- jQuery
- React
To see all tests search in Vulnerability Tests inside Security Center.