Skip to content

Commit fa47174

Browse files
committed
CWE-020: Lower security-severity for OverlyLargeRange queries to 4.0
1 parent 7b6720c commit fa47174

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id java/overly-large-range
1010
* @tags correctness

javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id js/overly-large-range
1010
* @tags correctness

python/ql/src/Security/CWE-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id py/overly-large-range
1010
* @tags correctness

ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
* This may allow an attacker to bypass a filter or sanitizer.
55
* @kind problem
66
* @problem.severity warning
7-
* @security-severity 5.0
7+
* @security-severity 4.0
88
* @precision high
99
* @id rb/overly-large-range
1010
* @tags correctness

0 commit comments

Comments
 (0)