Closed ghost closed 2 years ago
Your submission is now in status Generate Query Results.
For information, the evaluation workflow is the following: SecLab review > Generate Query Results > FP Check > CodeQL review > SecLab finalize > Pay > Closed
Your submission is now in status FP Check.
For information, the evaluation workflow is the following: SecLab review > Generate Query Results > FP Check > CodeQL review > SecLab finalize > Pay > Closed
Your submission is now in status CodeQL review.
For information, the evaluation workflow is the following: SecLab review > Generate Query Results > FP Check > CodeQL review > SecLab finalize > Pay > Closed
Your submission is now in status SecLab finalize.
For information, the evaluation workflow is the following: SecLab review > Generate Query Results > FP Check > CodeQL review > SecLab finalize > Pay > Closed
@edvraa: I think you did the right thing requesting the CVEs from Mitre. In my experience, you sometimes have to wait a little while for them to assign the CVE, so I would recommend giving them another month or so. Please @ me on this issue when the CVEs are assigned, so that we can pay the bounty.
At last Mitre has assigned CVEs!
Your submission is now in status Pay.
For information, the evaluation workflow is the following: Initial triage > Test run > Results analysis > Query review > Final decision > Pay > Closed
Created Hackerone report 1443028 for bounty 359732 : [423] Java: Regex injection
Your submission is now in status Closed.
For information, the evaluation workflow is the following: Initial triage > Test run > Results analysis > Query review > Final decision > Pay > Closed
Query
Relevant PR: https://github.com/github/codeql/pull/5704
CVE ID(s)