mirror of
https://github.com/github/codeql.git
synced 2025-12-24 04:36:35 +01:00
Add missing security-severity scores
This commit is contained in:
@@ -4,6 +4,7 @@
|
|||||||
* object and to execution of arbitrary code.
|
* object and to execution of arbitrary code.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
|
* @security-severity 9.8
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/jndi-injection
|
* @id java/jndi-injection
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
* information disclosure or execution of arbitrary code.
|
* information disclosure or execution of arbitrary code.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
|
* @security-severity 9.8
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/xslt-injection
|
* @id java/xslt-injection
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
* may lead to arbitrary code execution.
|
* may lead to arbitrary code execution.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
|
* @security-severity 9.3
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/groovy-injection
|
* @id java/groovy-injection
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
* may lead to remote code execution.
|
* may lead to remote code execution.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
|
* @security-severity 9.3
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/mvel-expression-injection
|
* @id java/mvel-expression-injection
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
* may lead to remote code execution.
|
* may lead to remote code execution.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
|
* @security-severity 9.3
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/spel-expression-injection
|
* @id java/spel-expression-injection
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -3,6 +3,7 @@
|
|||||||
* @description Writing information without explicit permissions to a shared temporary directory may disclose it to other users.
|
* @description Writing information without explicit permissions to a shared temporary directory may disclose it to other users.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 6.5
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/local-temp-file-or-directory-information-disclosure
|
* @id java/local-temp-file-or-directory-information-disclosure
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -5,6 +5,7 @@
|
|||||||
* the app vulnerable to man-in-the-middle attacks.
|
* the app vulnerable to man-in-the-middle attacks.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 9.8
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/unsafe-cert-trust
|
* @id java/unsafe-cert-trust
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -5,6 +5,7 @@
|
|||||||
* privileges or unexpected exposure from chained vulnerabilities.
|
* privileges or unexpected exposure from chained vulnerabilities.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 7.5
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/android/cleartext-storage-database
|
* @id java/android/cleartext-storage-database
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -5,6 +5,7 @@
|
|||||||
* from chained vulnerabilities.
|
* from chained vulnerabilities.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 7.5
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/android/cleartext-storage-filesystem
|
* @id java/android/cleartext-storage-filesystem
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -5,6 +5,7 @@
|
|||||||
* privileges or unexpected exposure from chained vulnerabilities.
|
* privileges or unexpected exposure from chained vulnerabilities.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 7.5
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/android/cleartext-storage-shared-prefs
|
* @id java/android/cleartext-storage-shared-prefs
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -6,6 +6,7 @@
|
|||||||
* the data vulnerable to packet sniffing.
|
* the data vulnerable to packet sniffing.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 8.8
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/insecure-basic-auth
|
* @id java/insecure-basic-auth
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
* application files and web resources from any origin exposing them to attack.
|
* application files and web resources from any origin exposing them to attack.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
|
* @security-severity 6.1
|
||||||
* @precision medium
|
* @precision medium
|
||||||
* @id java/android/unsafe-android-webview-fetch
|
* @id java/android/unsafe-android-webview-fetch
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
* lead to execution of arbitrary code.
|
* lead to execution of arbitrary code.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
|
* @security-severity 9.8
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/ognl-injection
|
* @id java/ognl-injection
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
category: queryMetadata
|
||||||
|
---
|
||||||
|
* Added the `security-severity` tag to several queries.
|
||||||
Reference in New Issue
Block a user