mirror of
https://github.com/github/codeql.git
synced 2025-12-17 17:23:36 +01:00
88 lines
5.2 KiB
Plaintext
88 lines
5.2 KiB
Plaintext
ql/javascript/ql/src/AngularJS/DisablingSce.ql
|
|
ql/javascript/ql/src/AngularJS/DoubleCompilation.ql
|
|
ql/javascript/ql/src/AngularJS/InsecureUrlWhitelist.ql
|
|
ql/javascript/ql/src/Diagnostics/ExtractedFiles.ql
|
|
ql/javascript/ql/src/Diagnostics/ExtractionErrors.ql
|
|
ql/javascript/ql/src/Electron/AllowRunningInsecureContent.ql
|
|
ql/javascript/ql/src/Electron/DisablingWebSecurity.ql
|
|
ql/javascript/ql/src/Performance/PolynomialReDoS.ql
|
|
ql/javascript/ql/src/Performance/ReDoS.ql
|
|
ql/javascript/ql/src/RegExp/IdentityReplacement.ql
|
|
ql/javascript/ql/src/Security/CWE-020/IncompleteHostnameRegExp.ql
|
|
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSchemeCheck.ql
|
|
ql/javascript/ql/src/Security/CWE-020/IncompleteUrlSubstringSanitization.ql
|
|
ql/javascript/ql/src/Security/CWE-020/IncorrectSuffixCheck.ql
|
|
ql/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql
|
|
ql/javascript/ql/src/Security/CWE-020/UselessRegExpCharacterEscape.ql
|
|
ql/javascript/ql/src/Security/CWE-022/TaintedPath.ql
|
|
ql/javascript/ql/src/Security/CWE-022/ZipSlip.ql
|
|
ql/javascript/ql/src/Security/CWE-073/TemplateObjectInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-078/CommandInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-078/ShellCommandInjectionFromEnvironment.ql
|
|
ql/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.ql
|
|
ql/javascript/ql/src/Security/CWE-078/UselessUseOfCat.ql
|
|
ql/javascript/ql/src/Security/CWE-079/ExceptionXss.ql
|
|
ql/javascript/ql/src/Security/CWE-079/ReflectedXss.ql
|
|
ql/javascript/ql/src/Security/CWE-079/StoredXss.ql
|
|
ql/javascript/ql/src/Security/CWE-079/UnsafeHtmlConstruction.ql
|
|
ql/javascript/ql/src/Security/CWE-079/UnsafeJQueryPlugin.ql
|
|
ql/javascript/ql/src/Security/CWE-079/Xss.ql
|
|
ql/javascript/ql/src/Security/CWE-079/XssThroughDom.ql
|
|
ql/javascript/ql/src/Security/CWE-089/SqlInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-094/CodeInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.ql
|
|
ql/javascript/ql/src/Security/CWE-094/UnsafeDynamicMethodAccess.ql
|
|
ql/javascript/ql/src/Security/CWE-1004/ClientExposedCookie.ql
|
|
ql/javascript/ql/src/Security/CWE-116/BadTagFilter.ql
|
|
ql/javascript/ql/src/Security/CWE-116/DoubleEscaping.ql
|
|
ql/javascript/ql/src/Security/CWE-116/IncompleteHtmlAttributeSanitization.ql
|
|
ql/javascript/ql/src/Security/CWE-116/IncompleteMultiCharacterSanitization.ql
|
|
ql/javascript/ql/src/Security/CWE-116/IncompleteSanitization.ql
|
|
ql/javascript/ql/src/Security/CWE-116/UnsafeHtmlExpansion.ql
|
|
ql/javascript/ql/src/Security/CWE-134/TaintedFormatString.ql
|
|
ql/javascript/ql/src/Security/CWE-178/CaseSensitiveMiddlewarePath.ql
|
|
ql/javascript/ql/src/Security/CWE-200/PrivateFileExposure.ql
|
|
ql/javascript/ql/src/Security/CWE-201/PostMessageStar.ql
|
|
ql/javascript/ql/src/Security/CWE-209/StackTraceExposure.ql
|
|
ql/javascript/ql/src/Security/CWE-295/DisablingCertificateValidation.ql
|
|
ql/javascript/ql/src/Security/CWE-300/InsecureDependencyResolution.ql
|
|
ql/javascript/ql/src/Security/CWE-312/BuildArtifactLeak.ql
|
|
ql/javascript/ql/src/Security/CWE-312/CleartextLogging.ql
|
|
ql/javascript/ql/src/Security/CWE-312/CleartextStorage.ql
|
|
ql/javascript/ql/src/Security/CWE-326/InsufficientKeySize.ql
|
|
ql/javascript/ql/src/Security/CWE-327/BadRandomness.ql
|
|
ql/javascript/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.ql
|
|
ql/javascript/ql/src/Security/CWE-338/InsecureRandomness.ql
|
|
ql/javascript/ql/src/Security/CWE-346/CorsMisconfigurationForCredentials.ql
|
|
ql/javascript/ql/src/Security/CWE-347/MissingJWTKeyVerification.ql
|
|
ql/javascript/ql/src/Security/CWE-352/MissingCsrfMiddleware.ql
|
|
ql/javascript/ql/src/Security/CWE-400/DeepObjectResourceExhaustion.ql
|
|
ql/javascript/ql/src/Security/CWE-502/UnsafeDeserialization.ql
|
|
ql/javascript/ql/src/Security/CWE-598/SensitiveGetQuery.ql
|
|
ql/javascript/ql/src/Security/CWE-601/ClientSideUrlRedirect.ql
|
|
ql/javascript/ql/src/Security/CWE-601/ServerSideUrlRedirect.ql
|
|
ql/javascript/ql/src/Security/CWE-611/Xxe.ql
|
|
ql/javascript/ql/src/Security/CWE-614/ClearTextCookie.ql
|
|
ql/javascript/ql/src/Security/CWE-640/HostHeaderPoisoningInEmailGeneration.ql
|
|
ql/javascript/ql/src/Security/CWE-643/XpathInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-693/InsecureHelmet.ql
|
|
ql/javascript/ql/src/Security/CWE-730/RegExpInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-730/ServerCrash.ql
|
|
ql/javascript/ql/src/Security/CWE-754/UnvalidatedDynamicMethodCall.ql
|
|
ql/javascript/ql/src/Security/CWE-770/MissingRateLimiting.ql
|
|
ql/javascript/ql/src/Security/CWE-770/ResourceExhaustion.ql
|
|
ql/javascript/ql/src/Security/CWE-776/XmlBomb.ql
|
|
ql/javascript/ql/src/Security/CWE-829/InsecureDownload.ql
|
|
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedDomain.ql
|
|
ql/javascript/ql/src/Security/CWE-830/FunctionalityFromUntrustedSource.ql
|
|
ql/javascript/ql/src/Security/CWE-834/LoopBoundInjection.ql
|
|
ql/javascript/ql/src/Security/CWE-843/TypeConfusionThroughParameterTampering.ql
|
|
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingAssignment.ql
|
|
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingFunction.ql
|
|
ql/javascript/ql/src/Security/CWE-915/PrototypePollutingMergeCall.ql
|
|
ql/javascript/ql/src/Security/CWE-916/InsufficientPasswordHash.ql
|
|
ql/javascript/ql/src/Security/CWE-918/RequestForgery.ql
|
|
ql/javascript/ql/src/Summary/LinesOfCode.ql
|
|
ql/javascript/ql/src/Summary/LinesOfUserCode.ql
|