Release preparation for version 2.11.3

This commit is contained in:
github-actions[bot]
2022-11-04 20:16:23 +00:00
parent 649c3af98a
commit 508327235a
82 changed files with 214 additions and 81 deletions

View File

@@ -1,3 +1,7 @@
## 0.3.3
No user-facing changes.
## 0.3.2
No user-facing changes.

View File

@@ -0,0 +1,3 @@
## 0.3.3
No user-facing changes.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.3.2
lastReleaseVersion: 0.3.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-all
version: 0.3.3-dev
version: 0.3.3
groups: javascript
dbscheme: semmlecode.javascript.dbscheme
extractor: javascript

View File

@@ -1,3 +1,17 @@
## 0.4.3
### New Queries
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.
### Minor Analysis Improvements
- Added sources for user defined path and query parameters in `Next.js`.
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.
## 0.4.2
### Minor Analysis Improvements

View File

@@ -1,7 +0,0 @@
---
category: newQuery
---
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.

View File

@@ -1,4 +0,0 @@
---
category: minorAnalysis
---
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.

View File

@@ -1,5 +0,0 @@
---
category: minorAnalysis
---
- Added sources for user defined path and query parameters in `Next.js`.

View File

@@ -0,0 +1,13 @@
## 0.4.3
### New Queries
* Added a new query, `js/second-order-command-line-injection`, to detect shell
commands that may execute arbitrary code when the user has control over
the arguments to a command-line program.
This currently flags up unsafe invocations of git and hg.
### Minor Analysis Improvements
- Added sources for user defined path and query parameters in `Next.js`.
* The alert message of many queries have been changed to better follow the style guide and make the message consistent with other languages.

View File

@@ -1,2 +1,2 @@
---
lastReleaseVersion: 0.4.2
lastReleaseVersion: 0.4.3

View File

@@ -1,5 +1,5 @@
name: codeql/javascript-queries
version: 0.4.3-dev
version: 0.4.3
groups:
- javascript
- queries