# Precompiled CodeQL query --- format: - 202308110 creator: 2.24.1 name: Regex injection.ql dbscheme: 66a489863649185f4a9770f894505803059a1312 stages: - filename: a1fdad6feic7mmud6i8vr973f71.bytes.qlx - filename: 8d9c745iktfhkd0qojlv35nkja0.bytes.qlx - filename: 6df3c9grn3buu1gp3h2dco977e7.bytes.qlx - filename: c33d7089hvh3k59s1m8kisqdmr5.bytes.qlx - filename: 7f6c75u95d8a7d4l6nelnklp92e.bytes.qlx - filename: 621c62d80vtue32d5pcambbcl88.bytes.qlx - filename: 217f9c15jcsq9j70ujf3p95eoh5.bytes.qlx - filename: df51d8mcvsam5c0qrlj7uahog86.bytes.qlx - filename: d4ab73u7a2unqan1s14eerob8n3.bytes.qlx - filename: 0e9a0enlv9mrgcp35h0vbn0tdf0.bytes.qlx - filename: 32b1b81oe3l6oon22pjiagkgjqc.bytes.qlx - filename: 1f852df61m4lp0r0p9fo6h79ug8.bytes.qlx - filename: a747b460j7cdd862vt2m9ib3uod.bytes.qlx - offset: 1 results: edges: resultArranger: 4"a"ei12"b"ei12"key"s"val"s nodes: resultArranger: 3"n"ei12"key"s"val"s subpaths: resultArranger: 4"arg"ei12"par"ei12"ret"ei12"out"ei12 '#select': resultArranger: 60ei12"sourceNode"ei12"sinkNode"ei120s0ei120s inputsDigest: 2f9456af6175d726262d1f07cb08e870 metadata: name: Regex injection description: |- User input used in regular expressions without escaping may allow an attacker to inject an expression that modifies the intended match. kind: path-problem id: rust/regex-injection problem.severity: error security-severity: 7.8 precision: high tags: |- security external/cwe/cwe-020 --- ...