mirror of
https://github.com/github/codeql.git
synced 2025-12-16 16:53:25 +01:00
Merge pull request #20671 from github/napalys/adjust_query_severity
Adjust query severity ratings
This commit is contained in:
@@ -4,7 +4,7 @@
|
|||||||
* This may allow an attacker to bypass a filter or sanitizer.
|
* This may allow an attacker to bypass a filter or sanitizer.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
* @security-severity 5.0
|
* @security-severity 4.0
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/overly-large-range
|
* @id java/overly-large-range
|
||||||
* @tags correctness
|
* @tags correctness
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
* interception.
|
* interception.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity error
|
* @problem.severity error
|
||||||
* @security-severity 5.0
|
* @security-severity 4.0
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id java/insecure-cookie
|
* @id java/insecure-cookie
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
category: queryMetadata
|
||||||
|
---
|
||||||
|
* Reduced the `security-severity` score of the `java/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
|
||||||
|
* Reduced the `security-severity` score of the `java/insecure-cookie` query from 5.0 to 4.0 to better reflect its impact.
|
||||||
@@ -4,7 +4,7 @@
|
|||||||
* This may allow an attacker to bypass a filter or sanitizer.
|
* This may allow an attacker to bypass a filter or sanitizer.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
* @security-severity 5.0
|
* @security-severity 4.0
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id js/overly-large-range
|
* @id js/overly-large-range
|
||||||
* @tags correctness
|
* @tags correctness
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
* can lead to a cross-site scripting vulnerability.
|
* can lead to a cross-site scripting vulnerability.
|
||||||
* @kind path-problem
|
* @kind path-problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
* @security-severity 6.1
|
* @security-severity 7.8
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id js/xss-through-dom
|
* @id js/xss-through-dom
|
||||||
* @tags security
|
* @tags security
|
||||||
|
|||||||
@@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
category: queryMetadata
|
||||||
|
---
|
||||||
|
* Increased the `security-severity` score of the `js/xss-through-dom` query from 6.1 to 7.8 to align with other XSS queries.
|
||||||
|
* Reduced the `security-severity` score of the `js/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
|
||||||
@@ -4,7 +4,7 @@
|
|||||||
* This may allow an attacker to bypass a filter or sanitizer.
|
* This may allow an attacker to bypass a filter or sanitizer.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
* @security-severity 5.0
|
* @security-severity 4.0
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id py/overly-large-range
|
* @id py/overly-large-range
|
||||||
* @tags correctness
|
* @tags correctness
|
||||||
|
|||||||
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
category: queryMetadata
|
||||||
|
---
|
||||||
|
* Reduced the `security-severity` score of the `py/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
|
||||||
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
category: queryMetadata
|
||||||
|
---
|
||||||
|
* Reduced the `security-severity` score of the `rb/overly-large-range` query from 5.0 to 4.0 to better reflect its impact.
|
||||||
@@ -4,7 +4,7 @@
|
|||||||
* This may allow an attacker to bypass a filter or sanitizer.
|
* This may allow an attacker to bypass a filter or sanitizer.
|
||||||
* @kind problem
|
* @kind problem
|
||||||
* @problem.severity warning
|
* @problem.severity warning
|
||||||
* @security-severity 5.0
|
* @security-severity 4.0
|
||||||
* @precision high
|
* @precision high
|
||||||
* @id rb/overly-large-range
|
* @id rb/overly-large-range
|
||||||
* @tags correctness
|
* @tags correctness
|
||||||
|
|||||||
Reference in New Issue
Block a user