Merge pull request #6815 from asgerf/js/adjust-security-severity-scores

Approved by erik-krogh, esbena
This commit is contained in:
CodeQL CI
2021-10-07 02:36:19 -07:00
committed by GitHub
8 changed files with 10 additions and 8 deletions

View File

@@ -5,7 +5,7 @@
* command-line injection vulnerabilities.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.8
* @security-severity 6.3
* @precision medium
* @id js/indirect-command-line-injection
* @tags correctness

View File

@@ -4,7 +4,7 @@
* environment may cause subtle bugs or vulnerabilities.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.8
* @security-severity 6.3
* @precision high
* @id js/shell-command-injection-from-environment
* @tags correctness

View File

@@ -4,7 +4,7 @@
* user to change the meaning of the command.
* @kind path-problem
* @problem.severity error
* @security-severity 9.8
* @security-severity 6.3
* @precision high
* @id js/shell-command-constructed-from-input
* @tags correctness

View File

@@ -3,7 +3,7 @@
* @description Using the `cat` process to read a file is unnecessarily complex, inefficient, unportable, and can lead to subtle bugs, or even security vulnerabilities.
* @kind problem
* @problem.severity error
* @security-severity 9.8
* @security-severity 6.3
* @precision high
* @id js/unnecessary-use-of-cat
* @tags correctness

View File

@@ -4,11 +4,12 @@
* code execution.
* @kind path-problem
* @problem.severity error
* @security-severity 6.1
* @security-severity 9.3
* @precision high
* @id js/code-injection
* @tags security
* external/cwe/cwe-094
* external/cwe/cwe-095
* external/cwe/cwe-079
* external/cwe/cwe-116
*/

View File

@@ -3,7 +3,7 @@
* @description Using external input in format strings can lead to garbled output.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.3
* @security-severity 7.3
* @precision high
* @id js/tainted-format-string
* @tags security

View File

@@ -4,10 +4,11 @@
* property can cause indefinite looping.
* @kind path-problem
* @problem.severity warning
* @security-severity 6.5
* @security-severity 7.5
* @id js/loop-bound-injection
* @tags security
* external/cwe/cwe-834
* external/cwe/cwe-730
* @precision high
*/

View File

@@ -3,7 +3,7 @@
* @description Writing network data directly to the file system allows arbitrary file upload and might indicate a backdoor.
* @kind path-problem
* @problem.severity warning
* @security-severity 9.8
* @security-severity 6.3
* @precision medium
* @id js/http-to-file-access
* @tags security