File tree Expand file tree Collapse file tree 4 files changed +12
-12
lines changed
javascript/ql/experimental/adaptivethreatmodeling/src Expand file tree Collapse file tree 4 files changed +12
-12
lines changed Original file line number Diff line number Diff line change 1
1
/**
2
2
* For internal use only.
3
3
*
4
- * @name NoSQL database query built from user-controlled sources (boosted )
4
+ * @name NoSQL database query built from user-controlled sources (experimental )
5
5
* @description Building a database query from user-controlled sources is vulnerable to insertion of
6
6
* malicious code by the user.
7
7
* @kind path-problem
8
8
* @scored
9
9
* @problem.severity error
10
10
* @security-severity 8.8
11
- * @id adaptive-threat-modeling/js /nosql-injection
12
- * @tags experimental experimental/atm security
11
+ * @id js/ml-powered /nosql-injection
12
+ * @tags experimental security
13
13
*/
14
14
15
15
import ATM:: ResultsInfo
Original file line number Diff line number Diff line change 1
1
/**
2
2
* For internal use only.
3
3
*
4
- * @name SQL database query built from user-controlled sources (boosted )
4
+ * @name SQL database query built from user-controlled sources (experimental )
5
5
* @description Building a database query from user-controlled sources is vulnerable to insertion of
6
6
* malicious code by the user.
7
7
* @kind path-problem
8
8
* @scored
9
9
* @problem.severity error
10
10
* @security-severity 8.8
11
- * @id adaptive-threat-modeling/js /sql-injection
12
- * @tags experimental experimental/atm security
11
+ * @id js/ml-powered /sql-injection
12
+ * @tags experimental security
13
13
*/
14
14
15
15
import experimental.adaptivethreatmodeling.SqlInjectionATM
Original file line number Diff line number Diff line change 1
1
/**
2
2
* For internal use only.
3
3
*
4
- * @name Uncontrolled data used in path expression (boosted )
4
+ * @name Uncontrolled data used in path expression (experimental )
5
5
* @description Accessing paths influenced by users can allow an attacker to access
6
6
* unexpected resources.
7
7
* @kind path-problem
8
8
* @scored
9
9
* @problem.severity error
10
10
* @security-severity 7.5
11
- * @id adaptive-threat-modeling/js /path-injection
12
- * @tags experimental experimental/atm security
11
+ * @id js/ml-powered /path-injection
12
+ * @tags experimental security
13
13
*/
14
14
15
15
import ATM:: ResultsInfo
Original file line number Diff line number Diff line change 1
1
/**
2
2
* For internal use only.
3
3
*
4
- * @name Client-side cross-site scripting (boosted )
4
+ * @name Client-side cross-site scripting (experimental )
5
5
* @description Writing user input directly to the DOM allows for
6
6
* a cross-site scripting vulnerability.
7
7
* @kind path-problem
8
8
* @scored
9
9
* @problem.severity error
10
10
* @security-severity 6.1
11
- * @id adaptive-threat-modeling/js /xss
12
- * @tags experimental experimental/atm security
11
+ * @id js/ml-powered /xss
12
+ * @tags experimental security
13
13
*/
14
14
15
15
import javascript
You can’t perform that action at this time.
0 commit comments