Files
codeql/ruby/ql/test/query-tests/security/decompression-api/DecompressionApi.expected
2022-06-17 02:43:54 +00:00

13 lines
1.4 KiB
Plaintext

edges
| decompression_api.rb:4:31:4:36 | call to params : | decompression_api.rb:4:31:4:43 | ...[...] |
| decompression_api.rb:14:31:14:36 | call to params : | decompression_api.rb:14:31:14:43 | ...[...] |
nodes
| decompression_api.rb:4:31:4:36 | call to params : | semmle.label | call to params : |
| decompression_api.rb:4:31:4:43 | ...[...] | semmle.label | ...[...] |
| decompression_api.rb:14:31:14:36 | call to params : | semmle.label | call to params : |
| decompression_api.rb:14:31:14:43 | ...[...] | semmle.label | ...[...] |
subpaths
#select
| decompression_api.rb:4:31:4:43 | ...[...] | decompression_api.rb:4:31:4:36 | call to params : | decompression_api.rb:4:31:4:43 | ...[...] | This call to $@ is unsafe because user-controlled data is used to set the object being decompressed, which could lead to a denial of service attack or malicious code extracted from an unknown source. | decompression_api.rb:4:9:4:44 | call to inflate | inflate |
| decompression_api.rb:14:31:14:43 | ...[...] | decompression_api.rb:14:31:14:36 | call to params : | decompression_api.rb:14:31:14:43 | ...[...] | This call to $@ is unsafe because user-controlled data is used to set the object being decompressed, which could lead to a denial of service attack or malicious code extracted from an unknown source. | decompression_api.rb:14:9:14:44 | call to open_buffer | open_buffer |