You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: javascript/ql/src/semmle/javascript/frameworks/NoSQL.qll
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -792,7 +792,7 @@ private module Redis {
792
792
* Thereby the method is vulnerable if parameter `argIndex` is unexpectedly an array instead of a string, as an attacker can control arguments to Redis that the attacker was not supposed to control.
793
793
*
794
794
* Only setters and similar methods are included.
795
-
* For getterlike methods it is not generally possible to gain access "outside" of where you are supposed to have access,
795
+
* For getter-like methods it is not generally possible to gain access "outside" of where you are supposed to have access,
796
796
* it is at most possible to get a Redis call to return more results than expected (e.g. by adding more members to [`geohash`](https://redis.io/commands/geohash)).
0 commit comments