// Jest Snapshot v1, https://goo.gl/fbAQLP

exports[`VulnerabilityDetails component pin test renders correctly 1`] = `
<div
  class="border-white mb-0 px-3"
>
  <!---->
   
  <vulnerability-detail-stub
    label="Status"
  >
    <gl-badge-stub
      class="text-capitalize"
      iconsize="md"
      size="md"
      variant="warning"
    >
      opened
    </gl-badge-stub>
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="Description"
  >
    <p
      data-testid="description"
    >
      The serialize-javascript npm package is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.
    </p>
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="Project"
  >
    <gl-link-stub
      href="/gitlab-org/gitlab-ui"
      target="_blank"
    >
      <gl-friendly-wrap-stub
        symbols="/"
        text="GitLab.org / gitlab-ui"
      />
    </gl-link-stub>
  </vulnerability-detail-stub>
   
  <!---->
   
  <vulnerability-detail-stub
    label="URL"
  >
    <gl-link-stub
      href="http://foo.bar/path"
      target="_blank"
    >
      <gl-friendly-wrap-stub
        symbols="/"
        text="http://foo.bar/path"
      />
    </gl-link-stub>
  </vulnerability-detail-stub>
   
  <!---->
   
  <!---->
   
  <vulnerability-detail-stub
    label="Actual Response"
  >
    <code-block-stub
      code="200 
key1: value1
key2: value2

<Message body is not provided>"
      maxheight="225px"
    />
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="File"
  >
    <gl-link-stub
      href="/gitlab-org/gitlab-ui/blob/ad137f0a8ac59af961afe47d04e5cc062c6864a9/yarn.lock"
      target="_blank"
    >
      <gl-friendly-wrap-stub
        symbols="/"
        text="yarn.lock"
      />
    </gl-link-stub>
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="Evidence"
  >
    <gl-friendly-wrap-stub
      symbols="/"
      text="Credit Card Detected: Diners Card"
    />
  </vulnerability-detail-stub>
   
  <!---->
   
  <!---->
   
  <!---->
   
  <!---->
   
  <vulnerability-detail-stub
    label="Identifiers"
  >
    <span>
      <gl-link-stub
        class="gl-word-break-all"
        href="https://deps.sec.gitlab.com/packages/npm/serialize-javascript/versions/1.7.0/advisories"
        rel="nofollow"
        target="_blank"
      >
        
        Gemnasium-58caa017-9a9a-46d6-bab2-ec930f46833c
      
      </gl-link-stub>
       
      <span>
        , 
      </span>
    </span>
    <span>
      <gl-link-stub
        class="gl-word-break-all"
        href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16769"
        rel="nofollow"
        target="_blank"
      >
        
        CVE-2019-16769
      
      </gl-link-stub>
       
      <!---->
    </span>
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="Severity"
  >
    <severity-badge-stub
      class="d-inline"
      severity="critical"
    />
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="Tool"
  >
    <gl-friendly-wrap-stub
      symbols="/"
      text="Dependency Scanning"
    />
  </vulnerability-detail-stub>
   
  <vulnerability-detail-stub
    label="Scanner Provider"
  >
    <gl-link-stub
      href="https://gitlab.com/gitlab-org/security-products/gemnasium"
      target="_blank"
    >
      <gl-friendly-wrap-stub
        symbols="/"
        text="Gemnasium (version 1.1.1)"
      />
    </gl-link-stub>
  </vulnerability-detail-stub>
   
  <!---->
   
  <!---->
   
  <!---->
   
  <vulnerability-detail-stub
    label="Links"
  >
    <span>
      <gl-link-stub
        class="gl-word-break-all"
        href="https://nvd.nist.gov/vuln/detail/CVE-2019-16769"
        target="_blank"
      >
        
        https://nvd.nist.gov/vuln/detail/CVE-2019-16769
      
      </gl-link-stub>
       
      <!---->
    </span>
  </vulnerability-detail-stub>
   
  <!---->
   
  <!---->
   
  <div
    style="display: none;"
  >
    <vulnerability-detail-stub
      label="Training"
    >
      <vulnerability-training-stub
        file="yarn.lock"
        identifiers="[object Object],[object Object]"
        projectfullpath="gitlab-org/gitlab-ui"
      />
    </vulnerability-detail-stub>
  </div>
</div>
`;
