Add severity scores

This commit is contained in:
Calum Grant
2021-04-20 20:51:29 +01:00
parent 76700d17d6
commit 649e313cb5
333 changed files with 333 additions and 0 deletions

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/offset-use-before-range-check
* @problem.severity warning
* @problem.security-severity 8.1
* @precision medium
* @tags reliability
* security

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/descriptor-may-not-be-closed
* @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency
* security
* external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/descriptor-never-closed
* @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency
* security
* external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/file-may-not-be-closed
* @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency
* security
* external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/file-never-closed
* @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency
* security
* external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/inconsistent-nullness-testing
* @problem.severity warning
* @problem.security-severity 7.5
* @tags reliability
* security
* external/cwe/cwe-476

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/memory-may-not-be-freed
* @problem.severity warning
* @problem.security-severity 7.5
* @tags efficiency
* security
* external/cwe/cwe-401

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/memory-never-freed
* @problem.severity warning
* @problem.security-severity 7.5
* @tags efficiency
* security
* external/cwe/cwe-401

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/missing-null-test
* @problem.severity recommendation
* @problem.security-severity 7.5
* @tags reliability
* security
* external/cwe/cwe-476

View File

@@ -3,6 +3,7 @@
* @description An object that was allocated with 'malloc' or 'new' is being freed using a mismatching 'free' or 'delete'.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.5
* @precision high
* @id cpp/new-free-mismatch
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/overflow-calculated
* @problem.severity warning
* @problem.security-severity 9.8
* @tags reliability
* security
* external/cwe/cwe-131

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/overflow-destination
* @problem.severity warning
* @problem.security-severity 8.8
* @precision low
* @tags reliability
* security

View File

@@ -4,6 +4,7 @@
* may result in a buffer overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.8
* @precision medium
* @id cpp/static-buffer-overflow
* @tags reliability

View File

@@ -4,6 +4,7 @@
* an instance of the type of the pointer may result in a buffer overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision medium
* @id cpp/allocation-too-small
* @tags reliability

View File

@@ -4,6 +4,7 @@
* multiple instances of the type of the pointer may result in a buffer overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision medium
* @id cpp/suspicious-allocation-size
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/use-after-free
* @problem.severity warning
* @problem.security-severity 8.8
* @tags reliability
* security
* external/cwe/cwe-416

View File

@@ -6,6 +6,7 @@
* to a larger type.
* @kind problem
* @problem.severity error
* @problem.security-severity 8.1
* @precision very-high
* @id cpp/bad-addition-overflow-check
* @tags reliability

View File

@@ -4,6 +4,7 @@
* be a sign that the result can overflow the type converted from.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision high
* @id cpp/integer-multiplication-cast-to-long
* @tags reliability

View File

@@ -6,6 +6,7 @@
* use the width of the base type, leading to misaligned reads.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 8.8
* @precision high
* @tags correctness
* reliability

View File

@@ -6,6 +6,7 @@
* from an untrusted source, this can be used for exploits.
* @kind problem
* @problem.severity recommendation
* @problem.security-severity 9.8
* @precision high
* @id cpp/non-constant-format
* @tags maintainability

View File

@@ -3,6 +3,7 @@
* @description Using alloca in a loop can lead to a stack overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.5
* @precision high
* @id cpp/alloca-in-loop
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/improper-null-termination
* @problem.severity warning
* @problem.security-severity 7.8
* @tags security
* external/cwe/cwe-170
* external/cwe/cwe-665

View File

@@ -4,6 +4,7 @@
* as the third argument may result in a buffer overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.8
* @precision medium
* @id cpp/bad-strncpy-size
* @tags reliability

View File

@@ -4,6 +4,7 @@
* as the third argument may result in a buffer overflow.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.8
* @precision medium
* @id cpp/unsafe-strncat
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/uninitialized-local
* @problem.severity warning
* @problem.security-severity 7.8
* @precision medium
* @tags security
* external/cwe/cwe-665

View File

@@ -4,6 +4,7 @@
* may result in a buffer overflow
* @kind problem
* @problem.severity warning
* @problem.security-severity 9.8
* @precision medium
* @id cpp/unsafe-strcat
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind path-problem
* @precision low
* @problem.severity error
* @problem.security-severity 8.6
* @tags security external/cwe/cwe-20
*/

View File

@@ -5,6 +5,7 @@
* @kind path-problem
* @precision low
* @problem.severity error
* @problem.security-severity 8.6
* @tags security external/cwe/cwe-20
*/

View File

@@ -4,6 +4,7 @@
* attacker to access unexpected resources.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 8.8
* @precision medium
* @id cpp/path-injection
* @tags security

View File

@@ -5,6 +5,7 @@
* to command injection.
* @kind problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision low
* @id cpp/command-line-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* allows for a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 6.1
* @precision high
* @id cpp/cgi-xss
* @tags security

View File

@@ -5,6 +5,7 @@
* to SQL Injection.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cpp/sql-injection
* @tags security

View File

@@ -5,6 +5,7 @@
* commands.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 8.2
* @precision medium
* @id cpp/uncontrolled-process-operation
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/overflow-buffer
* @problem.severity recommendation
* @problem.security-severity 8.8
* @tags security
* external/cwe/cwe-119
* external/cwe/cwe-121

View File

@@ -5,6 +5,7 @@
* overflow.
* @kind problem
* @problem.severity error
* @problem.security-severity 9.1
* @precision high
* @id cpp/badly-bounded-write
* @tags reliability

View File

@@ -4,6 +4,7 @@
* of data written may overflow.
* @kind problem
* @problem.severity error
* @problem.security-severity 9.1
* @precision medium
* @id cpp/overrunning-write
* @tags reliability

View File

@@ -5,6 +5,7 @@
* take extreme values.
* @kind problem
* @problem.severity error
* @problem.security-severity 9.1
* @precision medium
* @id cpp/overrunning-write-with-float
* @tags reliability

View File

@@ -4,6 +4,7 @@
* of data written may overflow.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.1
* @precision medium
* @id cpp/unbounded-write
* @tags reliability

View File

@@ -5,6 +5,7 @@
* a specific value to terminate the argument list.
* @kind problem
* @problem.severity warning
* @problem.security-severity 9.8
* @precision medium
* @id cpp/unterminated-variadic-call
* @tags reliability

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/unclear-array-index-validation
* @problem.severity warning
* @problem.security-severity 9.8
* @tags security
* external/cwe/cwe-129
*/

View File

@@ -5,6 +5,7 @@
* terminator can cause a buffer overrun.
* @kind problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cpp/no-space-for-terminator
* @tags reliability

View File

@@ -5,6 +5,7 @@
* or data representation problems.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 9.8
* @precision high
* @id cpp/tainted-format-string
* @tags reliability

View File

@@ -5,6 +5,7 @@
* or data representation problems.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 9.8
* @precision high
* @id cpp/tainted-format-string-through-global
* @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/user-controlled-null-termination-tainted
* @problem.severity warning
* @problem.security-severity 5.5
* @tags security
* external/cwe/cwe-170
*/

View File

@@ -4,6 +4,7 @@
* not validated can cause overflows.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision low
* @id cpp/tainted-arithmetic
* @tags security

View File

@@ -4,6 +4,7 @@
* validated can cause overflows.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision medium
* @id cpp/uncontrolled-arithmetic
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/arithmetic-with-extreme-values
* @problem.severity warning
* @problem.security-severity 8.1
* @precision low
* @tags security
* reliability

View File

@@ -5,6 +5,7 @@
* @id cpp/comparison-with-wider-type
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.8
* @precision high
* @tags reliability
* security

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/integer-overflow-tainted
* @problem.severity warning
* @problem.security-severity 8.1
* @precision low
* @tags security
* external/cwe/cwe-190

View File

@@ -4,6 +4,7 @@
* user can result in integer overflow.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 8.1
* @precision medium
* @id cpp/uncontrolled-allocation-size
* @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cpp/unsigned-difference-expression-compared-zero
* @problem.severity warning
* @problem.security-severity 8.2
* @precision medium
* @tags security
* correctness

View File

@@ -5,6 +5,7 @@
* vulnerable to spoofing attacks.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 7.7
* @precision medium
* @id cpp/user-controlled-bypass
* @tags security

View File

@@ -4,6 +4,7 @@
* to an attacker.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 7.5
* @precision medium
* @id cpp/cleartext-storage-buffer
* @tags security

View File

@@ -4,6 +4,7 @@
* to an attacker.
* @kind problem
* @problem.severity warning
* @problem.security-severity 6.5
* @precision medium
* @id cpp/cleartext-storage-file
* @tags security

View File

@@ -4,6 +4,7 @@
* database can expose it to an attacker.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 6.5
* @precision medium
* @id cpp/cleartext-storage-database
* @tags security

View File

@@ -4,6 +4,7 @@
* an attacker to compromise security.
* @kind problem
* @problem.severity error
* @problem.security-severity 7.5
* @precision medium
* @id cpp/weak-cryptographic-algorithm
* @tags security

View File

@@ -4,6 +4,7 @@
* attackers to retrieve portions of memory.
* @kind problem
* @problem.severity error
* @problem.security-severity 7.5
* @precision very-high
* @id cpp/openssl-heartbleed
* @tags security

View File

@@ -5,6 +5,7 @@
* the two operations.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.0
* @precision medium
* @id cpp/toctou-race-condition
* @tags security

View File

@@ -4,6 +4,7 @@
* @id cpp/unsafe-create-process-call
* @kind problem
* @problem.severity error
* @problem.security-severity 7.8
* @precision medium
* @msrc.severity important
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/incorrect-string-type-conversion
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @tags security
* external/cwe/cwe-704

View File

@@ -3,6 +3,7 @@
* @description Creating a file that is world-writable can allow an attacker to write to the file.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.8
* @precision medium
* @id cpp/world-writable-file-creation
* @tags security

View File

@@ -7,6 +7,7 @@
* @id cpp/unsafe-dacl-security-descriptor
* @kind problem
* @problem.severity error
* @problem.security-severity 7.8
* @precision high
* @tags security
* external/cwe/cwe-732

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/infinite-loop-with-unsatisfiable-exit-condition
* @problem.severity warning
* @problem.security-severity 7.5
* @tags security
* external/cwe/cwe-835
*/

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/redundant-null-check-param
* @problem.severity recommendation
* @problem.security-severity 7.5
* @tags reliability
* security
* external/cwe/cwe-476

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cpp/late-check-of-function-argument
* @problem.severity warning
* @problem.security-severity 8.6
* @precision medium
* @tags correctness
* security

View File

@@ -3,6 +3,7 @@
* @description Use of one of the scanf functions without a specified length.
* @kind problem
* @problem.severity warning
* @problem.security-severity 9.8
* @id cpp/memory-unsafe-function-scan
* @tags reliability
* security

View File

@@ -3,6 +3,7 @@
* @description Using a multiplication result that may overflow in the size of an allocation may lead to buffer overflows when the allocated memory is used.
* @kind path-problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision low
* @tags security
* correctness

View File

@@ -6,6 +6,7 @@
* from these methods is not checked.
* @kind problem
* @problem.severity recommendation
* @problem.security-severity 9.8
* @id cpp/drop-linux-privileges-outoforder
* @tags security
* external/cwe/cwe-273

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cpp/memory-leak-on-failed-call-to-realloc
* @problem.severity warning
* @problem.security-severity 7.5
* @precision medium
* @tags correctness
* security

View File

@@ -3,6 +3,7 @@
* @description Finds empty passwords in configuration files.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.1
* @precision medium
* @id cs/empty-password-in-configuration
* @tags security

View File

@@ -3,6 +3,7 @@
* @description Finds passwords in configuration files.
* @kind problem
* @problem.severity warning
* @problem.security-severity 6.5
* @precision medium
* @id cs/password-in-configuration
* @tags security

View File

@@ -3,6 +3,7 @@
* @description Finds uses of file upload
* @kind problem
* @problem.severity recommendation
* @problem.security-severity 8.8
* @precision high
* @id cs/web/file-upload
* @tags security

View File

@@ -5,6 +5,7 @@
* but under some circumstances may also result in incorrect results.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.0
* @precision medium
* @id cs/thread-unsafe-icryptotransform-field-in-class
* @tags concurrency

View File

@@ -6,6 +6,7 @@
* but under some circumstances may also result in incorrect results.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.0
* @precision medium
* @id cs/thread-unsafe-icryptotransform-captured-in-lambda
* @tags concurrency

View File

@@ -4,6 +4,7 @@
* denial-of-service attacks.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.1
* @id cs/web/large-max-request-length
* @tags security
* frameworks/asp.net

View File

@@ -3,6 +3,7 @@
* @description ASP.NET pages should not disable the built-in request validation.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.1
* @id cs/web/request-validation-disabled
* @tags security
* frameworks/asp.net

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cs/insecure-request-validation-mode
* @problem.severity warning
* @problem.security-severity 7.1
* @tags security
* external/cwe/cwe-016
*/

View File

@@ -4,6 +4,7 @@
* @kind problem
* @id cs/serialization-check-bypass
* @problem.severity warning
* @problem.security-severity 8.6
* @precision medium
* @tags security
* external/cwe/cwe-20

View File

@@ -5,6 +5,7 @@
* @kind path-problem
* @precision low
* @problem.severity error
* @problem.security-severity 8.6
* @tags security external/cwe/cwe-20
*/

View File

@@ -3,6 +3,7 @@
* @description Accessing paths influenced by users can allow an attacker to access unexpected resources.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 8.8
* @precision high
* @id cs/path-injection
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind path-problem
* @id cs/zipslip
* @problem.severity error
* @problem.security-severity 8.8
* @precision high
* @tags security
* external/cwe/cwe-022

View File

@@ -4,6 +4,7 @@
* user to change the meaning of the command.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cs/command-line-injection
* @tags correctness

View File

@@ -4,6 +4,7 @@
* user to change the meaning of the command.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision medium
* @id cs/stored-command-line-injection
* @tags correctness

View File

@@ -4,6 +4,7 @@
* scripting vulnerability if the data was originally user-provided.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 6.1
* @precision medium
* @id cs/web/stored-xss
* @tags security

View File

@@ -4,6 +4,7 @@
* allows for a cross-site scripting vulnerability.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 6.1
* @precision high
* @id cs/web/xss
* @tags security

View File

@@ -4,6 +4,7 @@
* of malicious SQL code by the user.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision medium
* @id cs/second-order-sql-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* malicious SQL code by the user.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cs/sql-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* malicious LDAP code by the user.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 5.4
* @precision high
* @id cs/ldap-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* insertion of malicious LDAP code by the user.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 5.4
* @precision medium
* @id cs/stored-ldap-injection
* @tags security

View File

@@ -5,6 +5,7 @@
* @kind problem
* @id cs/xml-injection
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @tags security
* external/cwe/cwe-091

View File

@@ -4,6 +4,7 @@
* malicious code.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cs/code-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* malicious user providing an unintended resource.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cs/resource-injection
* @tags security

View File

@@ -4,6 +4,7 @@
* schema.
* @kind path-problem
* @problem.severity recommendation
* @problem.security-severity 4.3
* @precision high
* @id cs/xml/missing-validation
* @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem
* @id cs/assembly-path-injection
* @problem.severity error
* @problem.security-severity 8.2
* @precision high
* @tags security
* external/cwe/cwe-114

View File

@@ -4,6 +4,7 @@
* insertion of forged log entries by a malicious user.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 5.3
* @precision high
* @id cs/log-forging
* @tags security

View File

@@ -5,6 +5,7 @@
* to return any value.
* @kind problem
* @problem.severity warning
* @problem.security-severity 8.8
* @precision high
* @id cs/unvalidated-local-pointer-arithmetic
* @tags security

View File

@@ -4,6 +4,7 @@
* and cause a denial of service.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 9.8
* @precision high
* @id cs/uncontrolled-format-string
* @tags security

View File

@@ -3,6 +3,7 @@
* @description Transmitting sensitive information to the user is a potential security risk.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 4.3
* @precision high
* @id cs/sensitive-data-transmission
* @tags security

View File

@@ -5,6 +5,7 @@
* developing a subsequent exploit.
* @kind path-problem
* @problem.severity error
* @problem.security-severity 5.3
* @precision high
* @id cs/information-exposure-through-exception
* @tags security

View File

@@ -4,6 +4,7 @@
* a global error handler, otherwise they may leak exception information.
* @kind problem
* @problem.severity warning
* @problem.security-severity 7.5
* @precision high
* @id cs/web/missing-global-error-handler
* @tags security

Some files were not shown because too many files have changed in this diff Show More