Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 9 additions & 2 deletions descriptions/api.github.com/api.github.com.json
Original file line number Diff line number Diff line change
Expand Up @@ -61877,6 +61877,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -98653,7 +98658,8 @@
"security",
"external/cwe/cwe-022"
],
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
"help_uri": "https://codeql.github.com/"
},
"tool": {
"name": "CodeQL",
Expand Down Expand Up @@ -98725,7 +98731,8 @@
"security",
"external/cwe/cwe-022"
],
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
"help_uri": "https://codeql.github.com/"
},
"tool": {
"name": "CodeQL",
Expand Down
7 changes: 7 additions & 0 deletions descriptions/api.github.com/api.github.com.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -44726,6 +44726,11 @@ components:
nullable: true
type: string
description: Detailed documentation for the rule as GitHub Flavored Markdown.
help_uri:
nullable: true
type: string
description: A link to the documentation for the rule used to detect the
alert.
code-scanning-analysis-tool-version:
nullable: true
type: string
Expand Down Expand Up @@ -74543,6 +74548,7 @@ components:
files from a malicious zip archive without validating that the destination
file path is within the destination directory can cause files outside
the destination directory to be overwritten ...'
help_uri: https://codeql.github.com/
tool:
name: CodeQL
guid:
Expand Down Expand Up @@ -74611,6 +74617,7 @@ components:
files from a malicious zip archive without validating that the destination
file path is within the destination directory can cause files outside
the destination directory to be overwritten ...'
help_uri: https://codeql.github.com/
tool:
name: CodeQL
guid:
Expand Down
26 changes: 24 additions & 2 deletions descriptions/api.github.com/dereferenced/api.github.com.deref.json
Original file line number Diff line number Diff line change
Expand Up @@ -19179,6 +19179,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -65834,6 +65839,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -204663,6 +204673,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -204825,7 +204840,8 @@
"security",
"external/cwe/cwe-022"
],
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
"help_uri": "https://codeql.github.com/"
},
"tool": {
"name": "CodeQL",
Expand Down Expand Up @@ -205292,6 +205308,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -205454,7 +205475,8 @@
"security",
"external/cwe/cwe-022"
],
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
"help_uri": "https://codeql.github.com/"
},
"tool": {
"name": "CodeQL",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8015,6 +8015,11 @@ paths:
type: string
description: Detailed documentation for the rule as GitHub
Flavored Markdown.
help_uri:
nullable: true
type: string
description: A link to the documentation for the rule used
to detect the alert.
tool: &293
type: object
properties:
Expand Down Expand Up @@ -41191,6 +41196,7 @@ paths:
the destination file path is within the destination directory
can cause files outside the destination directory to be overwritten
...'
help_uri: https://codeql.github.com/
tool:
name: CodeQL
guid:
Expand Down Expand Up @@ -41320,6 +41326,7 @@ paths:
the destination file path is within the destination directory
can cause files outside the destination directory to be overwritten
...'
help_uri: https://codeql.github.com/
tool:
name: CodeQL
guid:
Expand Down
16 changes: 14 additions & 2 deletions descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.json
Original file line number Diff line number Diff line change
Expand Up @@ -167179,6 +167179,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -167341,7 +167346,8 @@
"security",
"external/cwe/cwe-022"
],
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
"help_uri": "https://codeql.github.com/"
},
"tool": {
"name": "CodeQL",
Expand Down Expand Up @@ -167780,6 +167786,11 @@
"nullable": true,
"type": "string",
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
},
"help_uri": {
"nullable": true,
"type": "string",
"description": "A link to the documentation for the rule used to detect the alert."
}
}
},
Expand Down Expand Up @@ -167942,7 +167953,8 @@
"security",
"external/cwe/cwe-022"
],
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
"help_uri": "https://codeql.github.com/"
},
"tool": {
"name": "CodeQL",
Expand Down
7 changes: 7 additions & 0 deletions descriptions/ghes-3.2/dereferenced/ghes-3.2.deref.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -35427,6 +35427,11 @@ paths:
type: string
description: Detailed documentation for the rule as GitHub
Flavored Markdown.
help_uri:
nullable: true
type: string
description: A link to the documentation for the rule used
to detect the alert.
tool: *243
most_recent_instance: *244
instances:
Expand Down Expand Up @@ -35491,6 +35496,7 @@ paths:
the destination file path is within the destination directory
can cause files outside the destination directory to be overwritten
...'
help_uri: https://codeql.github.com/
tool:
name: CodeQL
guid:
Expand Down Expand Up @@ -35612,6 +35618,7 @@ paths:
the destination file path is within the destination directory
can cause files outside the destination directory to be overwritten
...'
help_uri: https://codeql.github.com/
tool:
name: CodeQL
guid:
Expand Down
Loading