Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 6db3661

Browse files
committed
spelling: arbitrary
Signed-off-by: Josh Soref <[email protected]>
1 parent c2a0dbe commit 6db3661

5 files changed

Lines changed: 5 additions & 5 deletions

File tree

java/ql/src/experimental/Security/CWE/CWE-094/SpringViewManipulation.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
including invocation of methods available in the JVM.
99
</p>
1010
<p>
11-
An unrestricted view name manipulation vulnerability in Spring Framework could lead to attacker-controlled arbitary SpEL expressions being evaluated using attacker-controlled data, which may in turn allow an attacker to run arbitrary code.
11+
An unrestricted view name manipulation vulnerability in Spring Framework could lead to attacker-controlled arbitrary SpEL expressions being evaluated using attacker-controlled data, which may in turn allow an attacker to run arbitrary code.
1212
</p>
1313
<p>
1414
Note: two related variants of this problem are detected by different queries, `java/spring-view-manipulation` and `java/spring-view-manipulation-implicit`. The first detects taint flow problems where the return types is always <code>String</code>. While the latter, `java/spring-view-manipulation-implicit` detects cases where the request mapping method has a non-string return type such as <code>void</code>.

javascript/ql/src/CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ No user-facing changes.
123123

124124
### New Queries
125125

126-
* A new query, `js/unsafe-code-construction`, has been added to the query suite, highlighting libraries that may leave clients vulnerable to arbitary code execution.
126+
* A new query, `js/unsafe-code-construction`, has been added to the query suite, highlighting libraries that may leave clients vulnerable to arbitrary code execution.
127127
The query is not run by default.
128128
* A new query `js/file-system-race` has been added. The query detects when there is time between a file being checked and used. The query is not run by default.
129129
* A new query `js/jwt-missing-verification` has been added. The query detects applications that don't verify JWT tokens.

javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ selector to determine which element should be manipulated.
3333
<p>
3434
However, if an attacker can control the <code>data-target</code> attribute,
3535
then the value of <code>target</code> can be used to cause the <code>$</code> function
36-
to execute arbitary JavaScript.
36+
to execute arbitrary JavaScript.
3737
</p>
3838
<p>
3939
The above vulnerability can be fixed by using <code>$.find</code> instead of <code>$</code>.

javascript/ql/src/change-notes/released/0.0.10.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
### New Queries
44

5-
* A new query, `js/unsafe-code-construction`, has been added to the query suite, highlighting libraries that may leave clients vulnerable to arbitary code execution.
5+
* A new query, `js/unsafe-code-construction`, has been added to the query suite, highlighting libraries that may leave clients vulnerable to arbitrary code execution.
66
The query is not run by default.
77
* A new query `js/file-system-race` has been added. The query detects when there is time between a file being checked and used. The query is not run by default.
88
* A new query `js/jwt-missing-verification` has been added. The query detects applications that don't verify JWT tokens.

ruby/ql/src/queries/security/cwe-502/UnsafeDeserialization.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ to execute arbitrary code.
1212
<recommendation>
1313
<p>
1414
Avoid deserialization of untrusted data if possible. If the architecture permits
15-
it, use serialization formats that cannot represent arbitarary objects. For
15+
it, use serialization formats that cannot represent arbitrary objects. For
1616
libraries that support it, such as the Ruby standard library's <code>JSON</code>
1717
module, ensure that the parser is configured to disable
1818
deserialization of arbitrary objects.

0 commit comments

Comments
 (0)