We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 348fab8 commit 5e96e28Copy full SHA for 5e96e28
java/ql/src/experimental/Security/CWE/CWE-094/JythonInjection.ql
@@ -3,6 +3,8 @@
3
* @description Evaluation of a user-controlled malicious expression in Java Python
4
* interpreter may lead to remote code execution.
5
* @kind path-problem
6
+ * @problem.severity error
7
+ * @precision high
8
* @id java/jython-injection
9
* @tags security
10
* external/cwe/cwe-094
0 commit comments