Skip to content

Commit 0c71047

Browse files
committed
C++: Update experimental test changes
1 parent edd29f4 commit 0c71047

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
edges
2-
| test.cpp:23:20:23:23 | argv | test.cpp:29:13:29:20 | (const char *)... |
3-
| test.cpp:23:20:23:23 | argv | test.cpp:29:13:29:20 | filePath |
2+
| test.cpp:22:27:22:30 | argv | test.cpp:29:13:29:20 | (const char *)... |
3+
| test.cpp:22:27:22:30 | argv | test.cpp:29:13:29:20 | filePath |
44
nodes
5-
| test.cpp:23:20:23:23 | argv | semmle.label | argv |
5+
| test.cpp:22:27:22:30 | argv | semmle.label | argv |
66
| test.cpp:29:13:29:20 | (const char *)... | semmle.label | (const char *)... |
77
| test.cpp:29:13:29:20 | filePath | semmle.label | filePath |
88
subpaths
99
#select
10-
| test.cpp:29:13:29:20 | (const char *)... | test.cpp:23:20:23:23 | argv | test.cpp:29:13:29:20 | (const char *)... | Using user-supplied data in a `wordexp` command, without disabling command substitution, can make code vulnerable to command injection. |
11-
| test.cpp:29:13:29:20 | filePath | test.cpp:23:20:23:23 | argv | test.cpp:29:13:29:20 | filePath | Using user-supplied data in a `wordexp` command, without disabling command substitution, can make code vulnerable to command injection. |
10+
| test.cpp:29:13:29:20 | (const char *)... | test.cpp:22:27:22:30 | argv | test.cpp:29:13:29:20 | (const char *)... | Using user-supplied data in a `wordexp` command, without disabling command substitution, can make code vulnerable to command injection. |
11+
| test.cpp:29:13:29:20 | filePath | test.cpp:22:27:22:30 | argv | test.cpp:29:13:29:20 | filePath | Using user-supplied data in a `wordexp` command, without disabling command substitution, can make code vulnerable to command injection. |

0 commit comments

Comments
 (0)