From 3db6e431588e3b45b99df98a0f0300d41b39082a Mon Sep 17 00:00:00 2001 From: Aditya Sharad <6874315+adityasharad@users.noreply.github.com> Date: Thu, 10 Sep 2020 13:13:54 -0700 Subject: [PATCH 1/3] Java: Test change to emptyblock.ql --- java/ql/examples/snippets/emptyblock.ql | 1 + 1 file changed, 1 insertion(+) diff --git a/java/ql/examples/snippets/emptyblock.ql b/java/ql/examples/snippets/emptyblock.ql index 72efe38865b4..80d3730cc07a 100644 --- a/java/ql/examples/snippets/emptyblock.ql +++ b/java/ql/examples/snippets/emptyblock.ql @@ -5,6 +5,7 @@ * @tags empty * block * statement + * example */ import java From 640a97ab9f8392c0d9179f8ced7a892747e9d7ce Mon Sep 17 00:00:00 2001 From: Aditya Sharad <6874315+adityasharad@users.noreply.github.com> Date: Thu, 10 Sep 2020 13:15:16 -0700 Subject: [PATCH 2/3] Create README.md --- java/ql/src/README.md | 1 + 1 file changed, 1 insertion(+) create mode 100644 java/ql/src/README.md diff --git a/java/ql/src/README.md b/java/ql/src/README.md new file mode 100644 index 000000000000..345e6aef7132 --- /dev/null +++ b/java/ql/src/README.md @@ -0,0 +1 @@ +Test From c1d6a20edd411f0ccce569ee538ed0a4f8161a09 Mon Sep 17 00:00:00 2001 From: Aditya Sharad <6874315+adityasharad@users.noreply.github.com> Date: Tue, 12 Jan 2021 16:27:43 -0800 Subject: [PATCH 3/3] Qhelp: Trivial change --- .../experimental/Security/CWE/CWE-016/SpringBootActuators.qhelp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.qhelp b/java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.qhelp index 53ee653aaff3..c950196363d3 100644 --- a/java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.qhelp +++ b/java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.qhelp @@ -3,7 +3,7 @@ "qhelp.dtd"> -

Spring Boot includes a number of additional features called actuators that let you monitor +

Spring Boot includes a number of additional features called actuators that let you monitor and interact with your web application. Exposing unprotected actuator endpoints via JXM or HTTP can, however, lead to information disclosure or even to remote code execution vulnerability.