File tree Expand file tree Collapse file tree 4 files changed +12
-12
lines changed
javascript/ql/experimental/adaptivethreatmodeling/src Expand file tree Collapse file tree 4 files changed +12
-12
lines changed Original file line number Diff line number Diff line change 11/**
22 * For internal use only.
33 *
4- * @name NoSQL database query built from user-controlled sources (boosted )
4+ * @name NoSQL database query built from user-controlled sources (experimental )
55 * @description Building a database query from user-controlled sources is vulnerable to insertion of
66 * malicious code by the user.
77 * @kind path-problem
88 * @scored
99 * @problem.severity error
1010 * @security-severity 8.8
11- * @id adaptive-threat-modeling/js /nosql-injection
12- * @tags experimental experimental/atm security
11+ * @id js/ml-powered /nosql-injection
12+ * @tags experimental security
1313 */
1414
1515import ATM:: ResultsInfo
Original file line number Diff line number Diff line change 11/**
22 * For internal use only.
33 *
4- * @name SQL database query built from user-controlled sources (boosted )
4+ * @name SQL database query built from user-controlled sources (experimental )
55 * @description Building a database query from user-controlled sources is vulnerable to insertion of
66 * malicious code by the user.
77 * @kind path-problem
88 * @scored
99 * @problem.severity error
1010 * @security-severity 8.8
11- * @id adaptive-threat-modeling/js /sql-injection
12- * @tags experimental experimental/atm security
11+ * @id js/ml-powered /sql-injection
12+ * @tags experimental security
1313 */
1414
1515import experimental.adaptivethreatmodeling.SqlInjectionATM
Original file line number Diff line number Diff line change 11/**
22 * For internal use only.
33 *
4- * @name Uncontrolled data used in path expression (boosted )
4+ * @name Uncontrolled data used in path expression (experimental )
55 * @description Accessing paths influenced by users can allow an attacker to access
66 * unexpected resources.
77 * @kind path-problem
88 * @scored
99 * @problem.severity error
1010 * @security-severity 7.5
11- * @id adaptive-threat-modeling/js /path-injection
12- * @tags experimental experimental/atm security
11+ * @id js/ml-powered /path-injection
12+ * @tags experimental security
1313 */
1414
1515import ATM:: ResultsInfo
Original file line number Diff line number Diff line change 11/**
22 * For internal use only.
33 *
4- * @name Client-side cross-site scripting (boosted )
4+ * @name Client-side cross-site scripting (experimental )
55 * @description Writing user input directly to the DOM allows for
66 * a cross-site scripting vulnerability.
77 * @kind path-problem
88 * @scored
99 * @problem.severity error
1010 * @security-severity 6.1
11- * @id adaptive-threat-modeling/js /xss
12- * @tags experimental experimental/atm security
11+ * @id js/ml-powered /xss
12+ * @tags experimental security
1313 */
1414
1515import javascript
You can’t perform that action at this time.
0 commit comments