Quality Clouds Documentation ... Rules and rulesets All rules Salesforce rules Configuration elements Static Resource rules The following table shows the list of Salesforce Static resource rules that are checked by Quality Clouds.Best PracticeIssue SeverityImpact AreaUse of Open Source Javascript frameworkWarningManageabilityXSS vulnerability in Ext JS Action Column getTipWarningSecurityAngularJS - Prototype Pollution Vulnerability under 1.7.9HighSecurityAngularJS - XSS vulnerability using AngularJS under 1.6.9 with FirefoxHighSecurityAngularJS - XSS vulnerability through the attribute "usemap" from 1.3.0 to 1.5.0-rc2HighSecurityAngularJS - XSS vulnerability through the attribute "usemap" from 1.0.0 to 1.2.30HighSecurityAngularJS - XSS vulnerability using AngularJS under 1.6.5 in Firefox and Safari - sanitize on inert DocumentsHighSecurityAngularJS - XSS vulnerability under 1.8.0 - input HTMLHighSecurityAngularJS - Denial of Service attack through DOM clobbering on versions under 1.6.3HighSecurityjQuery - XSS vulnerability under 3.5.0, when using htmlPrefilterHighSecurityXSS vulnerability in Ext JS Action Column getTipHighSecurityjQuery - Prototype Pollution Vulnerability under 3.4.0HighSecurityjQuery - XSS vulnerability under 1.6.3, when using location.hashHighSecurityjQuery - XSS vulnerability under 1.9.0, when using jQuery(strInput)HighSecurityjQuery - XSS vulnerability under 3.0.0, when making cross-domain calls without the dataType optionHighSecurityjQuery-ui-tooltip - XSS vulnerability under 1.10.0, title attributeHighSecurityjQuery-ui-dialog - XSS vulnerability under 1.10.0, title attributeHighSecurityjQuery-ui-dialog - XSS vulnerability under 1.10.0, closeText parameterHighSecuritymoment.js - Regular Expression Denial of Service VulnerabilityHighSecurity