Add security-severity tags

This commit is contained in:
Calum Grant
2021-04-15 17:47:23 +01:00
parent 578ce1e512
commit 47adf24b25
369 changed files with 369 additions and 0 deletions

View File

@@ -3,6 +3,7 @@
* @description If an exception is allocated on the heap, then it should be deleted when caught.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cpp/catch-missing-free
* @tags efficiency

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/offset-use-before-range-check
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @tags reliability
* security

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/inconsistent-nullness-testing
* @problem.severity warning
* @problem.security-severity high
* @tags reliability
* security
* external/cwe/cwe-476

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/memory-may-not-be-freed
* @problem.severity warning
* @problem.security-severity high
* @tags efficiency
* security
* external/cwe/cwe-401

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/memory-never-freed
* @problem.severity warning
* @problem.security-severity high
* @tags efficiency
* security
* external/cwe/cwe-401

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/missing-null-test
* @problem.severity recommendation
* @problem.security-severity high
* @tags reliability
* security
* external/cwe/cwe-476

View File

@@ -3,6 +3,7 @@
* @description An object that was allocated with 'malloc' or 'new' is being freed using a mismatching 'free' or 'delete'.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cpp/new-free-mismatch
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/overflow-calculated
* @problem.severity warning
* @problem.security-severity critical
* @tags reliability
* security
* external/cwe/cwe-131

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/overflow-destination
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @tags reliability
* security

View File

@@ -4,6 +4,7 @@
* may result in a buffer overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/static-buffer-overflow
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/return-value-ignored
* @problem.severity recommendation
* @problem.security-severity critical
* @precision medium
* @tags reliability
* correctness

View File

@@ -4,6 +4,7 @@
* an instance of the type of the pointer may result in a buffer overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/allocation-too-small
* @tags reliability

View File

@@ -4,6 +4,7 @@
* multiple instances of the type of the pointer may result in a buffer overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/suspicious-allocation-size
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/use-after-free
* @problem.severity warning
* @problem.security-severity high
* @tags reliability
* security
* external/cwe/cwe-416

View File

@@ -7,6 +7,7 @@
* overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cpp/ambiguously-signed-bit-field
* @tags reliability

View File

@@ -6,6 +6,7 @@
* to a larger type.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision very-high
* @id cpp/bad-addition-overflow-check
* @tags reliability

View File

@@ -4,6 +4,7 @@
* be a sign that the result can overflow the type converted from.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cpp/integer-multiplication-cast-to-long
* @tags reliability

View File

@@ -6,6 +6,7 @@
* use the width of the base type, leading to misaligned reads.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @tags correctness
* reliability

View File

@@ -6,6 +6,7 @@
* from an untrusted source, this can be used for exploits.
* @kind problem
* @problem.severity recommendation
* @problem.security-severity critical
* @precision high
* @id cpp/non-constant-format
* @tags maintainability

View File

@@ -3,6 +3,7 @@
* @description A function is called, and the same operation is usually performed on the return value - for example, free, delete, close etc. However, in some cases it is not performed. These unusual cases may indicate misuse of the API and could cause resource leaks.
* @kind problem
* @problem.severity warning
* @problem.security-severity critical
* @precision medium
* @id cpp/inconsistent-call-on-result
* @tags reliability

View File

@@ -6,6 +6,7 @@
* omitting the check could crash the program.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision medium
* @id cpp/inconsistent-null-check
* @tags reliability

View File

@@ -3,6 +3,7 @@
* @description A for-loop iteration expression goes backward with respect of the initialization statement and condition expression.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision high
* @id cpp/inconsistent-loop-direction
* @tags correctness

View File

@@ -3,6 +3,7 @@
* @description Using alloca in a loop can lead to a stack overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cpp/alloca-in-loop
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/improper-null-termination
* @problem.severity warning
* @problem.security-severity high
* @tags security
* external/cwe/cwe-170
* external/cwe/cwe-665

View File

@@ -4,6 +4,7 @@
* as the third argument may result in a buffer overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/bad-strncpy-size
* @tags reliability

View File

@@ -4,6 +4,7 @@
* as the third argument may result in a buffer overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/unsafe-strncat
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/uninitialized-local
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @tags security
* external/cwe/cwe-665

View File

@@ -4,6 +4,7 @@
* may result in a buffer overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity critical
* @precision medium
* @id cpp/unsafe-strcat
* @tags reliability

View File

@@ -5,6 +5,7 @@
* it should be moved before the dereference.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @id cpp/redundant-null-check-simple
* @tags reliability
* correctness

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/ignore-return-value-sal
* @problem.severity warning
* @problem.security-severity critical
* @tags reliability
* external/cwe/cwe-573
* external/cwe/cwe-252

View File

@@ -5,6 +5,7 @@
* @kind path-problem
* @precision low
* @problem.severity error
* @problem.security-severity high
* @tags security external/cwe/cwe-20
*/

View File

@@ -5,6 +5,7 @@
* @kind path-problem
* @precision low
* @problem.severity error
* @problem.security-severity high
* @tags security external/cwe/cwe-20
*/

View File

@@ -4,6 +4,7 @@
* attacker to access unexpected resources.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/path-injection
* @tags security

View File

@@ -5,6 +5,7 @@
* to command injection.
* @kind problem
* @problem.severity error
* @problem.security-severity critical
* @precision low
* @id cpp/command-line-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* allows for a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error
* @problem.security-severity medium
* @precision high
* @id cpp/cgi-xss
* @tags security

View File

@@ -5,6 +5,7 @@
* to SQL Injection.
* @kind path-problem
* @problem.severity error
* @problem.security-severity critical
* @precision high
* @id cpp/sql-injection
* @tags security

View File

@@ -5,6 +5,7 @@
* commands.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/uncontrolled-process-operation
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/overflow-buffer
* @problem.severity recommendation
* @problem.security-severity high
* @tags security
* external/cwe/cwe-119
* external/cwe/cwe-121

View File

@@ -5,6 +5,7 @@
* overflow.
* @kind problem
* @problem.severity error
* @problem.security-severity critical
* @precision high
* @id cpp/badly-bounded-write
* @tags reliability

View File

@@ -4,6 +4,7 @@
* of data written may overflow.
* @kind problem
* @problem.severity error
* @problem.security-severity critical
* @precision medium
* @id cpp/overrunning-write
* @tags reliability

View File

@@ -5,6 +5,7 @@
* take extreme values.
* @kind problem
* @problem.severity error
* @problem.security-severity critical
* @precision medium
* @id cpp/overrunning-write-with-float
* @tags reliability

View File

@@ -4,6 +4,7 @@
* of data written may overflow.
* @kind path-problem
* @problem.severity error
* @problem.security-severity critical
* @precision medium
* @id cpp/unbounded-write
* @tags reliability

View File

@@ -5,6 +5,7 @@
* a specific value to terminate the argument list.
* @kind problem
* @problem.severity warning
* @problem.security-severity critical
* @precision medium
* @id cpp/unterminated-variadic-call
* @tags reliability

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/unclear-array-index-validation
* @problem.severity warning
* @problem.security-severity critical
* @tags security
* external/cwe/cwe-129
*/

View File

@@ -5,6 +5,7 @@
* terminator can cause a buffer overrun.
* @kind problem
* @problem.severity error
* @problem.security-severity critical
* @precision high
* @id cpp/no-space-for-terminator
* @tags reliability

View File

@@ -5,6 +5,7 @@
* or data representation problems.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity critical
* @precision high
* @id cpp/tainted-format-string
* @tags reliability

View File

@@ -5,6 +5,7 @@
* or data representation problems.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity critical
* @precision high
* @id cpp/tainted-format-string-through-global
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/user-controlled-null-termination-tainted
* @problem.severity warning
* @problem.security-severity medium
* @tags security
* external/cwe/cwe-170
*/

View File

@@ -4,6 +4,7 @@
* not validated can cause overflows.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @id cpp/tainted-arithmetic
* @tags security

View File

@@ -4,6 +4,7 @@
* validated can cause overflows.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/uncontrolled-arithmetic
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/arithmetic-with-extreme-values
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @tags security
* reliability

View File

@@ -5,6 +5,7 @@
* @id cpp/comparison-with-wider-type
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @tags reliability
* security

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/integer-overflow-tainted
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @tags security
* external/cwe/cwe-190

View File

@@ -4,6 +4,7 @@
* user can result in integer overflow.
* @kind path-problem
* @problem.severity error
* @problem.security-severity high
* @precision medium
* @id cpp/uncontrolled-allocation-size
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/unsigned-difference-expression-compared-zero
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @tags security
* correctness

View File

@@ -5,6 +5,7 @@
* vulnerable to spoofing attacks.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/user-controlled-bypass
* @tags security

View File

@@ -4,6 +4,7 @@
* to an attacker.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/cleartext-storage-buffer
* @tags security

View File

@@ -4,6 +4,7 @@
* an attacker to compromise security.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision medium
* @id cpp/weak-cryptographic-algorithm
* @tags security

View File

@@ -4,6 +4,7 @@
* attackers to retrieve portions of memory.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision very-high
* @id cpp/openssl-heartbleed
* @tags security

View File

@@ -5,6 +5,7 @@
* the two operations.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/toctou-race-condition
* @tags security

View File

@@ -4,6 +4,7 @@
* @id cpp/unsafe-create-process-call
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision medium
* @msrc.severity important
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/incorrect-string-type-conversion
* @problem.severity error
* @problem.security-severity critical
* @precision high
* @tags security
* external/cwe/cwe-704

View File

@@ -3,6 +3,7 @@
* @description Creating a file that is world-writable can allow an attacker to write to the file.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cpp/world-writable-file-creation
* @tags security

View File

@@ -7,6 +7,7 @@
* @id cpp/unsafe-dacl-security-descriptor
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision high
* @tags security
* external/cwe/cwe-732

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/infinite-loop-with-unsatisfiable-exit-condition
* @problem.severity warning
* @problem.security-severity high
* @tags security
* external/cwe/cwe-835
*/

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/redundant-null-check-param
* @problem.severity recommendation
* @problem.security-severity high
* @tags reliability
* security
* external/cwe/cwe-476

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/late-check-of-function-argument
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @tags correctness
* security

View File

@@ -3,6 +3,7 @@
* @description Use of one of the scanf functions without a specified length.
* @kind problem
* @problem.severity warning
* @problem.security-severity critical
* @id cpp/memory-unsafe-function-scan
* @tags reliability
* security

View File

@@ -3,6 +3,7 @@
* @description Using a multiplication result that may overflow in the size of an allocation may lead to buffer overflows when the allocated memory is used.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @tags security
* correctness

View File

@@ -6,6 +6,7 @@
* from these methods is not checked.
* @kind problem
* @problem.severity recommendation
* @problem.security-severity critical
* @id cpp/drop-linux-privileges-outoforder
* @tags security
* external/cwe/cwe-273

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/memory-leak-on-failed-call-to-realloc
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @tags correctness
* security

View File

@@ -3,6 +3,7 @@
* @description All resources acquired by a class should be released by its destructor. Avoid the use of the 'open / close' pattern, since C++ constructors and destructors provide a safer way to handle resource acquisition and release. Best practice in C++ is to use the 'RAII' technique: constructors allocate resources and destructors free them.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cpp/resource-not-released-in-destructor
* @tags efficiency

View File

@@ -4,6 +4,7 @@
* may result in unexpected sign extension or overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @id cpp/signed-bit-field
* @tags correctness

View File

@@ -5,6 +5,7 @@
* not be released.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cs/dispose-not-called-on-throw
* @tags efficiency

View File

@@ -4,6 +4,7 @@
* should dispose those members in their 'Dispose()' method.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @id cs/member-not-disposed
* @tags efficiency

View File

@@ -4,6 +4,7 @@
* should also declare/override 'Dispose()'.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision low
* @id cs/missing-dispose-method
* @tags efficiency

View File

@@ -4,6 +4,7 @@
* objects, otherwise unmanaged resources may not be released.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cs/local-not-disposed
* @tags efficiency

View File

@@ -4,6 +4,7 @@
* of that method, the calls that do not check the return value may be mistakes.
* @kind problem
* @problem.severity warning
* @problem.security-severity critical
* @precision low
* @id cs/unchecked-return-value
* @tags reliability

View File

@@ -5,6 +5,7 @@
* is likely to cause an infinite loop.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision very-high
* @id cs/constant-condition
* @tags maintainability

View File

@@ -3,6 +3,7 @@
* @description Dereferencing a variable whose value is 'null' causes a 'NullReferenceException'.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision very-high
* @id cs/dereferenced-value-is-always-null
* @tags reliability

View File

@@ -4,6 +4,7 @@
* 'NullReferenceException'.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cs/dereferenced-value-may-be-null
* @tags reliability

View File

@@ -4,6 +4,7 @@
* to provide the desired thread safety.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision high
* @id cs/unsafe-sync-on-field
* @tags reliability

View File

@@ -3,6 +3,7 @@
* @description Locking in an inconsistent sequence can lead to deadlock.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision high
* @id cs/inconsistent-lock-sequence
* @tags reliability

View File

@@ -4,6 +4,7 @@
* it might be locked elsewhere.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cs/lock-this
* @tags reliability

View File

@@ -3,6 +3,7 @@
* @description A lock is held during a call to System.Threading.Monitor.Wait(). This can lead to deadlocks and performance problems.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision high
* @id cs/locked-wait
* @tags reliability

View File

@@ -4,6 +4,7 @@
* then the value returned by the getter can be inconsistent.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision medium
* @id cs/unsynchronized-getter
* @tags correctness

View File

@@ -4,6 +4,7 @@
* during an addition or resizing operation, an infinite loop can occur.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision medium
* @id cs/unsynchronized-static-access
* @tags concurrency

View File

@@ -3,6 +3,7 @@
* @description Finds empty passwords in configuration files.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cs/empty-password-in-configuration
* @tags security

View File

@@ -3,6 +3,7 @@
* @description Finds passwords in configuration files.
* @kind problem
* @problem.severity warning
* @problem.security-severity medium
* @precision medium
* @id cs/password-in-configuration
* @tags security

View File

@@ -3,6 +3,7 @@
* @description Finds uses of file upload
* @kind problem
* @problem.severity recommendation
* @problem.security-severity high
* @precision high
* @id cs/web/file-upload
* @tags security

View File

@@ -4,6 +4,7 @@
* in an array indexing operation that could be out of bounds.
* @kind problem
* @problem.severity error
* @problem.security-severity critical
* @precision high
* @id cs/index-out-of-bounds
* @tags reliability

View File

@@ -4,6 +4,7 @@
* floating-point value may result in a loss of precision.
* @kind problem
* @problem.severity error
* @problem.security-severity high
* @precision high
* @id cs/loss-of-precision
* @tags reliability

View File

@@ -4,6 +4,7 @@
* guarantee an evenly distributed sequence of random numbers.
* @kind problem
* @problem.severity warning
* @problem.security-severity critical
* @precision low
* @id cs/random-used-once
* @tags reliability

View File

@@ -5,6 +5,7 @@
* but under some circumstances may also result in incorrect results.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cs/thread-unsafe-icryptotransform-field-in-class
* @tags concurrency

View File

@@ -6,6 +6,7 @@
* but under some circumstances may also result in incorrect results.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cs/thread-unsafe-icryptotransform-captured-in-lambda
* @tags concurrency

View File

@@ -3,6 +3,7 @@
* @description Not every enumerable sequence is repeatable, so it is dangerous to write code that can consume elements of a sequence in more than one place.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @id cs/linq/inconsistent-enumeration
* @tags reliability

View File

@@ -4,6 +4,7 @@
* denial-of-service attacks.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @id cs/web/large-max-request-length
* @tags security
* frameworks/asp.net

View File

@@ -3,6 +3,7 @@
* @description ASP.NET pages should not disable the built-in request validation.
* @kind problem
* @problem.severity warning
* @problem.security-severity high
* @id cs/web/request-validation-disabled
* @tags security
* frameworks/asp.net

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cs/insecure-request-validation-mode
* @problem.severity warning
* @problem.security-severity high
* @tags security
* external/cwe/cwe-016
*/

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cs/serialization-check-bypass
* @problem.severity warning
* @problem.security-severity high
* @precision medium
* @tags security
* external/cwe/cwe-20

Some files were not shown because too many files have changed in this diff Show More