-
Notifications
You must be signed in to change notification settings - Fork 253
[Java]: CWE-730 Regex injection #351
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Your submission is now in status SecLab review. For information, the evaluation workflow is the following: |
Your submission is now in status CodeQL review. For information, the evaluation workflow is the following: |
Your submission is now in status SecLab finalize. For information, the evaluation workflow is the following: |
Your submission is now in status Pay. For information, the evaluation workflow is the following: |
Created Hackerone report 1219492 for bounty 309995 : [351] [Java]: CWE-730 Regex injection |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Query
Link to pull request with your CodeQL query:
Relevant PR: github/codeql#5704
Report
User controlled regex pattern may lead to Denial of Service.
The text was updated successfully, but these errors were encountered: