Update security-severity scores

This commit is contained in:
Calum Grant
2021-06-15 13:25:17 +01:00
parent 19305a217a
commit 771e686946
343 changed files with 343 additions and 343 deletions

View File

@@ -3,7 +3,7 @@
* @description Disabling strict contextual escaping (SCE) can cause security vulnerabilities.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision very-high
* @id js/angular/disabling-sce
* @tags security

View File

@@ -4,7 +4,7 @@
* unexpected behavior of directives, performance problems, and memory leaks.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 8.8
* @id js/angular/double-compilation
* @tags reliability
* frameworks/angularjs

View File

@@ -3,7 +3,7 @@
* @description URL whitelists that are too permissive can cause security vulnerabilities.
* @kind problem
* @problem.severity warning
* @security-severity 6.4
* @security-severity 7.5
* @precision very-high
* @id js/angular/insecure-url-whitelist
* @tags security

View File

@@ -4,7 +4,7 @@
* link type 'noopener' or 'noreferrer' are a potential security risk.
* @kind problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.5
* @id js/unsafe-external-link
* @tags maintainability
* security

View File

@@ -3,7 +3,7 @@
* @description Enabling allowRunningInsecureContent can allow remote code execution.
* @kind problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 8.8
* @precision very-high
* @tags security
* frameworks/electron

View File

@@ -3,7 +3,7 @@
* @description Disabling webSecurity can cause critical security vulnerabilities.
* @kind problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision very-high
* @tags security
* frameworks/electron

View File

@@ -3,7 +3,7 @@
* @description Enabling `nodeIntegration` or `nodeIntegrationInWorker` can expose the application to remote code execution.
* @kind problem
* @problem.severity warning
* @security-severity 10.0
* @security-severity 9.3
* @precision low
* @id js/enabling-electron-renderer-node-integration
* @tags security

View File

@@ -4,7 +4,7 @@
* to match may be vulnerable to denial-of-service attacks.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/polynomial-redos
* @tags security

View File

@@ -5,7 +5,7 @@
* attacks.
* @kind problem
* @problem.severity error
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/redos
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Replacing a substring with itself has no effect and may indicate a mistake.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @id js/identity-replacement
* @precision very-high
* @tags correctness

View File

@@ -3,7 +3,7 @@
* @description Matching a URL or hostname against a regular expression that contains an unescaped dot as part of the hostname might match more hostnames than expected.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/incomplete-hostname-regexp
* @tags correctness

View File

@@ -4,7 +4,7 @@
* and "data:" suggests a logic error or even a security vulnerability.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/incomplete-url-scheme-check
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Security checks on the substrings of an unparsed URL are often vulnerable to bypassing.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/incomplete-url-substring-sanitization
* @tags correctness

View File

@@ -3,7 +3,7 @@
* @description Using indexOf to implement endsWith functionality is error-prone if the -1 case is not explicitly handled.
* @kind problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/incorrect-suffix-check
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Regular expressions without anchors can be vulnerable to bypassing.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision medium
* @id js/regex/missing-regexp-anchor
* @tags correctness

View File

@@ -5,7 +5,7 @@
* @kind path-problem
* @precision low
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.8
* @tags security external/cwe/cwe-20
*/

View File

@@ -5,7 +5,7 @@
* behave unexpectedly.
* @kind problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/useless-regexp-character-escape
* @tags correctness

View File

@@ -4,7 +4,7 @@
* unexpected resources.
* @kind path-problem
* @problem.severity error
* @security-severity 6.4
* @security-severity 7.5
* @precision high
* @id js/path-injection
* @tags security

View File

@@ -6,7 +6,7 @@
* @kind path-problem
* @id js/zipslip
* @problem.severity error
* @security-severity 6.4
* @security-severity 7.5
* @precision high
* @tags security
* external/cwe/cwe-022

View File

@@ -3,7 +3,7 @@
* @description Instantiating a template using a user-controlled object is vulnerable to local file read and potential remote code execution.
* @kind path-problem
* @problem.severity error
* @security-severity 10.0
* @security-severity 9.3
* @precision high
* @id js/template-object-injection
* @tags security

View File

@@ -4,7 +4,7 @@
* user to change the meaning of the command.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/command-line-injection
* @tags correctness

View File

@@ -5,7 +5,7 @@
* command-line injection vulnerabilities.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 9.8
* @precision medium
* @id js/indirect-command-line-injection
* @tags correctness

View File

@@ -4,7 +4,7 @@
* environment may cause subtle bugs or vulnerabilities.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/shell-command-injection-from-environment
* @tags correctness

View File

@@ -4,7 +4,7 @@
* user to change the meaning of the command.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/shell-command-constructed-from-input
* @tags correctness

View File

@@ -3,7 +3,7 @@
* @description Using the `cat` process to read a file is unnecessarily complex, inefficient, unportable, and can lead to subtle bugs, or even security vulnerabilities.
* @kind problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/unnecessary-use-of-cat
* @tags correctness

View File

@@ -4,7 +4,7 @@
* can lead to a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity warning
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/xss-through-exception
* @tags security

View File

@@ -4,7 +4,7 @@
* a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/reflected-xss
* @tags security

View File

@@ -4,7 +4,7 @@
* a stored cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/stored-xss
* @tags security

View File

@@ -4,7 +4,7 @@
* user to perform a cross-site scripting attack.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/html-constructed-from-input
* @tags security

View File

@@ -3,7 +3,7 @@
* @description A jQuery plugin that unintentionally constructs HTML from some of its options may be unsafe to use for clients.
* @kind path-problem
* @problem.severity warning
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/unsafe-jquery-plugin
* @tags security

View File

@@ -4,7 +4,7 @@
* a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/xss
* @tags security

View File

@@ -4,7 +4,7 @@
* can lead to a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity warning
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/xss-through-dom
* @tags security

View File

@@ -4,7 +4,7 @@
* malicious code by the user.
* @kind path-problem
* @problem.severity error
* @security-severity 6.4
* @security-severity 8.8
* @precision high
* @id js/sql-injection
* @tags security

View File

@@ -4,7 +4,7 @@
* code execution.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/code-injection
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Escaping code as HTML does not provide protection against code injection.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/bad-code-sanitization
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Invoking user-controlled methods on certain objects can lead to remote code execution.
* @kind path-problem
* @problem.severity error
* @security-severity 10.0
* @security-severity 9.3
* @precision high
* @id js/unsafe-dynamic-method-access
* @tags security

View File

@@ -5,7 +5,7 @@
* and conversely it has to be unescaped last to avoid double-unescaping.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/double-escaping
* @tags correctness

View File

@@ -5,7 +5,7 @@
* scripting vulnerability.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.1
* @precision high
* @id js/incomplete-html-attribute-sanitization
* @tags security

View File

@@ -3,7 +3,7 @@
* @description A sanitizer that removes a sequence of characters may reintroduce the dangerous sequence.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/incomplete-multi-character-sanitization
* @tags correctness

View File

@@ -4,7 +4,7 @@
* meta-character may be ineffective.
* @kind problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/incomplete-sanitization
* @tags correctness

View File

@@ -4,7 +4,7 @@
* tags may lead to cross-site scripting vulnerabilities.
* @kind problem
* @problem.severity warning
* @security-severity 2.9
* @security-severity 6.1
* @precision very-high
* @id js/unsafe-html-expansion
* @tags correctness

View File

@@ -4,7 +4,7 @@
* insertion of forged log entries by a malicious user.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.8
* @precision medium
* @id js/log-injection
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Using external input in format strings can lead to garbled output.
* @kind path-problem
* @problem.severity warning
* @security-severity 6.9
* @security-severity 9.3
* @precision high
* @id js/tainted-format-string
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Directly sending file data in an outbound network request can indicate unauthorized information disclosure.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.5
* @precision medium
* @id js/file-access-to-http
* @tags security

View File

@@ -4,7 +4,7 @@
* of private information.
* @kind problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.5
* @id js/exposure-of-private-files
* @tags security
* external/cwe/cwe-200

View File

@@ -5,7 +5,7 @@
* information leaks.
* @kind path-problem
* @problem.severity error
* @security-severity 1.4
* @security-severity 4.3
* @precision high
* @id js/cross-window-information-leak
* @tags security

View File

@@ -5,7 +5,7 @@
* to an attacker for developing a subsequent exploit.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 5.4
* @precision very-high
* @id js/stack-trace-exposure
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Disabling cryptographic certificate validation can cause security vulnerabilities.
* @kind problem
* @problem.severity error
* @security-severity 5.2
* @security-severity 7.5
* @precision very-high
* @id js/disabling-certificate-validation
* @tags security

View File

@@ -4,7 +4,7 @@
* expose it to an attacker.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.5
* @precision high
* @id js/build-artifact-leak
* @tags security

View File

@@ -4,7 +4,7 @@
* expose it to an attacker.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.5
* @precision high
* @id js/clear-text-logging
* @tags security

View File

@@ -4,7 +4,7 @@
* attacker.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.5
* @precision high
* @id js/clear-text-storage-of-sensitive-data
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Storing unencrypted passwords in configuration files is unsafe.
* @kind problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 7.5
* @precision medium
* @id js/password-in-configuration-file
* @tags security

View File

@@ -4,7 +4,7 @@
* the results and compromise security.
* @kind problem
* @problem.severity warning
* @security-severity 5.2
* @security-severity 7.5
* @precision high
* @id js/biased-cryptographic-random
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Using broken or weak cryptographic algorithms can compromise security.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.2
* @security-severity 7.5
* @precision high
* @id js/weak-cryptographic-algorithm
* @tags security

View File

@@ -5,7 +5,7 @@
* be generated.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 7.8
* @precision high
* @id js/insecure-randomness
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Misconfiguration of CORS HTTP headers allows for leaks of secret credentials.
* @kind path-problem
* @problem.severity error
* @security-severity 5.2
* @security-severity 7.5
* @precision high
* @id js/cors-misconfiguration-for-credentials
* @tags security

View File

@@ -4,7 +4,7 @@
* submit requests on behalf of the user.
* @kind problem
* @problem.severity error
* @security-severity 6.4
* @security-severity 8.8
* @precision high
* @id js/missing-token-validation
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Processing user-controlled object hierarchies inefficiently can lead to denial of service.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/resource-exhaustion-from-deep-object-traversal
* @tags security

View File

@@ -4,7 +4,7 @@
* denial-of-service attacks.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 7.5
* @precision medium
* @id js/remote-property-injection
* @tags security

View File

@@ -4,7 +4,7 @@
* overlay their own UI on top of the site by using an iframe.
* @kind problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.5
* @precision low
* @id js/missing-x-frame-options
* @tags security

View File

@@ -4,7 +4,7 @@
* execute arbitrary code.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/unsafe-deserialization
* @tags security

View File

@@ -5,7 +5,7 @@
* be avoided.
* @kind path-problem
* @problem.severity error
* @security-severity 5.2
* @security-severity 9.1
* @precision medium
* @id js/hardcoded-data-interpreted-as-code
* @tags security

View File

@@ -4,7 +4,7 @@
* may cause redirection to malicious web sites.
* @kind path-problem
* @problem.severity error
* @security-severity 2.9
* @security-severity 6.1
* @precision high
* @id js/client-side-unvalidated-url-redirection
* @tags security

View File

@@ -4,7 +4,7 @@
* may cause redirection to malicious web sites.
* @kind path-problem
* @problem.severity warning
* @security-severity 2.7
* @security-severity 6.1
* @id js/server-side-unvalidated-url-redirection
* @tags security
* external/cwe/cwe-601

View File

@@ -4,7 +4,7 @@
* entity expansion is vulnerable to XXE attacks.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.1
* @precision high
* @id js/xxe
* @tags security

View File

@@ -4,7 +4,7 @@
* attacks and leak password reset tokens.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/host-header-forgery-in-email-generation
* @tags security

View File

@@ -4,7 +4,7 @@
* malicious code by the user.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/xpath-injection
* @tags security

View File

@@ -5,7 +5,7 @@
* exponential time on certain inputs.
* @kind path-problem
* @problem.severity error
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/regex-injection
* @tags security

View File

@@ -4,7 +4,7 @@
* attacks.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/server-crash
* @tags security

View File

@@ -4,7 +4,7 @@
* an unexpected target, which could cause an exception.
* @kind path-problem
* @problem.severity warning
* @security-severity 4.2
* @security-severity 7.5
* @precision high
* @id js/unvalidated-dynamic-method-call
* @tags security

View File

@@ -5,7 +5,7 @@
* to denial-of-service attacks.
* @kind problem
* @problem.severity error
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/missing-rate-limiting
* @tags security

View File

@@ -4,7 +4,7 @@
* entity expansion is vulnerable to denial-of-service attacks.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 7.5
* @precision high
* @id js/xml-bomb
* @tags security

View File

@@ -4,7 +4,7 @@
* to gain unauthorized access.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/hardcoded-credentials
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Conditions that the user controls are not suited for making security-related decisions.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.8
* @precision medium
* @id js/user-controlled-bypass
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Comparing different kinds of HTTP request data may be a symptom of an insufficient security check.
* @kind problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 7.8
* @precision low
* @id js/different-kinds-comparison-bypass
* @tags security

View File

@@ -4,7 +4,7 @@
* opens up for potential man-in-the-middle attacks.
* @kind path-problem
* @problem.severity error
* @security-severity 6.4
* @security-severity 8.1
* @precision high
* @id js/insecure-download
* @tags security

View File

@@ -4,7 +4,7 @@
* property can cause indefinite looping.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.5
* @id js/loop-bound-injection
* @tags security
* external/cwe/cwe-834

View File

@@ -3,7 +3,7 @@
* @description Sanitizing an HTTP request parameter may be ineffective if the user controls its type.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.8
* @precision high
* @id js/type-confusion-through-parameter-tampering
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Writing network data directly to the file system allows arbitrary file upload and might indicate a backdoor.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 9.8
* @precision medium
* @id js/http-to-file-access
* @tags security

View File

@@ -5,7 +5,7 @@
* and possibly escalate to remote code execution or cross-site scripting.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.1
* @precision high
* @id js/prototype-polluting-assignment
* @tags security

View File

@@ -4,7 +4,7 @@
* the cause of accidental modification of a built-in prototype object.
* @kind path-problem
* @problem.severity warning
* @security-severity 3.6
* @security-severity 6.1
* @precision high
* @id js/prototype-pollution-utility
* @tags security

View File

@@ -5,7 +5,7 @@
* and possibly escalate to remote code execution or cross-site scripting.
* @kind path-problem
* @problem.severity error
* @security-severity 3.6
* @security-severity 6.1
* @precision high
* @id js/prototype-pollution
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Creating a hash of a password with low computational effort makes the hash vulnerable to password cracking attacks.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.9
* @security-severity 8.1
* @precision high
* @id js/insufficient-password-hash
* @tags security

View File

@@ -3,7 +3,7 @@
* @description Sending network requests with user-controlled data allows for request forgery attacks.
* @kind path-problem
* @problem.severity error
* @security-severity 5.9
* @security-severity 9.1
* @precision medium
* @id js/request-forgery
* @tags security