Add severity scores

This commit is contained in:
Calum Grant
2021-04-20 20:51:29 +01:00
parent 76700d17d6
commit 649e313cb5
333 changed files with 333 additions and 0 deletions

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/offset-use-before-range-check * @id cpp/offset-use-before-range-check
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision medium * @precision medium
* @tags reliability * @tags reliability
* security * security

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/descriptor-may-not-be-closed * @id cpp/descriptor-may-not-be-closed
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency * @tags efficiency
* security * security
* external/cwe/cwe-775 * external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/descriptor-never-closed * @id cpp/descriptor-never-closed
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency * @tags efficiency
* security * security
* external/cwe/cwe-775 * external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/file-may-not-be-closed * @id cpp/file-may-not-be-closed
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency * @tags efficiency
* security * security
* external/cwe/cwe-775 * external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/file-never-closed * @id cpp/file-never-closed
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @tags efficiency * @tags efficiency
* security * security
* external/cwe/cwe-775 * external/cwe/cwe-775

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/inconsistent-nullness-testing * @id cpp/inconsistent-nullness-testing
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @tags reliability * @tags reliability
* security * security
* external/cwe/cwe-476 * external/cwe/cwe-476

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/memory-may-not-be-freed * @id cpp/memory-may-not-be-freed
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @tags efficiency * @tags efficiency
* security * security
* external/cwe/cwe-401 * external/cwe/cwe-401

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/memory-never-freed * @id cpp/memory-never-freed
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @tags efficiency * @tags efficiency
* security * security
* external/cwe/cwe-401 * external/cwe/cwe-401

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/missing-null-test * @id cpp/missing-null-test
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 7.5
* @tags reliability * @tags reliability
* security * security
* external/cwe/cwe-476 * external/cwe/cwe-476

View File

@@ -3,6 +3,7 @@
* @description An object that was allocated with 'malloc' or 'new' is being freed using a mismatching 'free' or 'delete'. * @description An object that was allocated with 'malloc' or 'new' is being freed using a mismatching 'free' or 'delete'.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @precision high * @precision high
* @id cpp/new-free-mismatch * @id cpp/new-free-mismatch
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/overflow-calculated * @id cpp/overflow-calculated
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @tags reliability * @tags reliability
* security * security
* external/cwe/cwe-131 * external/cwe/cwe-131

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/overflow-destination * @id cpp/overflow-destination
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision low * @precision low
* @tags reliability * @tags reliability
* security * security

View File

@@ -4,6 +4,7 @@
* may result in a buffer overflow. * may result in a buffer overflow.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision medium * @precision medium
* @id cpp/static-buffer-overflow * @id cpp/static-buffer-overflow
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* an instance of the type of the pointer may result in a buffer overflow * an instance of the type of the pointer may result in a buffer overflow
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision medium * @precision medium
* @id cpp/allocation-too-small * @id cpp/allocation-too-small
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* multiple instances of the type of the pointer may result in a buffer overflow * multiple instances of the type of the pointer may result in a buffer overflow
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision medium * @precision medium
* @id cpp/suspicious-allocation-size * @id cpp/suspicious-allocation-size
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/use-after-free * @id cpp/use-after-free
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @tags reliability * @tags reliability
* security * security
* external/cwe/cwe-416 * external/cwe/cwe-416

View File

@@ -6,6 +6,7 @@
* to a larger type. * to a larger type.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.1
* @precision very-high * @precision very-high
* @id cpp/bad-addition-overflow-check * @id cpp/bad-addition-overflow-check
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* be a sign that the result can overflow the type converted from. * be a sign that the result can overflow the type converted from.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision high * @precision high
* @id cpp/integer-multiplication-cast-to-long * @id cpp/integer-multiplication-cast-to-long
* @tags reliability * @tags reliability

View File

@@ -6,6 +6,7 @@
* use the width of the base type, leading to misaligned reads. * use the width of the base type, leading to misaligned reads.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision high * @precision high
* @tags correctness * @tags correctness
* reliability * reliability

View File

@@ -6,6 +6,7 @@
* from an untrusted source, this can be used for exploits. * from an untrusted source, this can be used for exploits.
* @kind problem * @kind problem
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cpp/non-constant-format * @id cpp/non-constant-format
* @tags maintainability * @tags maintainability

View File

@@ -3,6 +3,7 @@
* @description Using alloca in a loop can lead to a stack overflow * @description Using alloca in a loop can lead to a stack overflow
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @precision high * @precision high
* @id cpp/alloca-in-loop * @id cpp/alloca-in-loop
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/improper-null-termination * @id cpp/improper-null-termination
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @tags security * @tags security
* external/cwe/cwe-170 * external/cwe/cwe-170
* external/cwe/cwe-665 * external/cwe/cwe-665

View File

@@ -4,6 +4,7 @@
* as the third argument may result in a buffer overflow. * as the third argument may result in a buffer overflow.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision medium * @precision medium
* @id cpp/bad-strncpy-size * @id cpp/bad-strncpy-size
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* as the third argument may result in a buffer overflow. * as the third argument may result in a buffer overflow.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision medium * @precision medium
* @id cpp/unsafe-strncat * @id cpp/unsafe-strncat
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/uninitialized-local * @id cpp/uninitialized-local
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @precision medium * @precision medium
* @tags security * @tags security
* external/cwe/cwe-665 * external/cwe/cwe-665

View File

@@ -4,6 +4,7 @@
* may result in a buffer overflow * may result in a buffer overflow
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @precision medium * @precision medium
* @id cpp/unsafe-strcat * @id cpp/unsafe-strcat
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind path-problem * @kind path-problem
* @precision low * @precision low
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.6
* @tags security external/cwe/cwe-20 * @tags security external/cwe/cwe-20
*/ */

View File

@@ -5,6 +5,7 @@
* @kind path-problem * @kind path-problem
* @precision low * @precision low
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.6
* @tags security external/cwe/cwe-20 * @tags security external/cwe/cwe-20
*/ */

View File

@@ -4,6 +4,7 @@
* attacker to access unexpected resources. * attacker to access unexpected resources.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision medium * @precision medium
* @id cpp/path-injection * @id cpp/path-injection
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* to command injection. * to command injection.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision low * @precision low
* @id cpp/command-line-injection * @id cpp/command-line-injection
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* allows for a cross-site scripting vulnerability. * allows for a cross-site scripting vulnerability.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 6.1
* @precision high * @precision high
* @id cpp/cgi-xss * @id cpp/cgi-xss
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* to SQL Injection. * to SQL Injection.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cpp/sql-injection * @id cpp/sql-injection
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* commands. * commands.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.2
* @precision medium * @precision medium
* @id cpp/uncontrolled-process-operation * @id cpp/uncontrolled-process-operation
* @tags security * @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/overflow-buffer * @id cpp/overflow-buffer
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 8.8
* @tags security * @tags security
* external/cwe/cwe-119 * external/cwe/cwe-119
* external/cwe/cwe-121 * external/cwe/cwe-121

View File

@@ -5,6 +5,7 @@
* overflow. * overflow.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.1
* @precision high * @precision high
* @id cpp/badly-bounded-write * @id cpp/badly-bounded-write
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* of data written may overflow. * of data written may overflow.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.1
* @precision medium * @precision medium
* @id cpp/overrunning-write * @id cpp/overrunning-write
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* take extreme values. * take extreme values.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.1
* @precision medium * @precision medium
* @id cpp/overrunning-write-with-float * @id cpp/overrunning-write-with-float
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* of data written may overflow. * of data written may overflow.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.1
* @precision medium * @precision medium
* @id cpp/unbounded-write * @id cpp/unbounded-write
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* a specific value to terminate the argument list. * a specific value to terminate the argument list.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @precision medium * @precision medium
* @id cpp/unterminated-variadic-call * @id cpp/unterminated-variadic-call
* @tags reliability * @tags reliability

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/unclear-array-index-validation * @id cpp/unclear-array-index-validation
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @tags security * @tags security
* external/cwe/cwe-129 * external/cwe/cwe-129
*/ */

View File

@@ -5,6 +5,7 @@
* terminator can cause a buffer overrun. * terminator can cause a buffer overrun.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cpp/no-space-for-terminator * @id cpp/no-space-for-terminator
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* or data representation problems. * or data representation problems.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cpp/tainted-format-string * @id cpp/tainted-format-string
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* or data representation problems. * or data representation problems.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cpp/tainted-format-string-through-global * @id cpp/tainted-format-string-through-global
* @tags reliability * @tags reliability

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/user-controlled-null-termination-tainted * @id cpp/user-controlled-null-termination-tainted
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 5.5
* @tags security * @tags security
* external/cwe/cwe-170 * external/cwe/cwe-170
*/ */

View File

@@ -4,6 +4,7 @@
* not validated can cause overflows. * not validated can cause overflows.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision low * @precision low
* @id cpp/tainted-arithmetic * @id cpp/tainted-arithmetic
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* validated can cause overflows. * validated can cause overflows.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision medium * @precision medium
* @id cpp/uncontrolled-arithmetic * @id cpp/uncontrolled-arithmetic
* @tags security * @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/arithmetic-with-extreme-values * @id cpp/arithmetic-with-extreme-values
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision low * @precision low
* @tags security * @tags security
* reliability * reliability

View File

@@ -5,6 +5,7 @@
* @id cpp/comparison-with-wider-type * @id cpp/comparison-with-wider-type
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @precision high * @precision high
* @tags reliability * @tags reliability
* security * security

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/integer-overflow-tainted * @id cpp/integer-overflow-tainted
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision low * @precision low
* @tags security * @tags security
* external/cwe/cwe-190 * external/cwe/cwe-190

View File

@@ -4,6 +4,7 @@
* user can result in integer overflow. * user can result in integer overflow.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.1
* @precision medium * @precision medium
* @id cpp/uncontrolled-allocation-size * @id cpp/uncontrolled-allocation-size
* @tags reliability * @tags reliability

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cpp/unsigned-difference-expression-compared-zero * @id cpp/unsigned-difference-expression-compared-zero
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.2
* @precision medium * @precision medium
* @tags security * @tags security
* correctness * correctness

View File

@@ -5,6 +5,7 @@
* vulnerable to spoofing attacks. * vulnerable to spoofing attacks.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.7
* @precision medium * @precision medium
* @id cpp/user-controlled-bypass * @id cpp/user-controlled-bypass
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* to an attacker. * to an attacker.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @precision medium * @precision medium
* @id cpp/cleartext-storage-buffer * @id cpp/cleartext-storage-buffer
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* to an attacker. * to an attacker.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 6.5
* @precision medium * @precision medium
* @id cpp/cleartext-storage-file * @id cpp/cleartext-storage-file
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* database can expose it to an attacker. * database can expose it to an attacker.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 6.5
* @precision medium * @precision medium
* @id cpp/cleartext-storage-database * @id cpp/cleartext-storage-database
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* an attacker to compromise security. * an attacker to compromise security.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 7.5
* @precision medium * @precision medium
* @id cpp/weak-cryptographic-algorithm * @id cpp/weak-cryptographic-algorithm
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* attackers to retrieve portions of memory. * attackers to retrieve portions of memory.
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 7.5
* @precision very-high * @precision very-high
* @id cpp/openssl-heartbleed * @id cpp/openssl-heartbleed
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* the two operations. * the two operations.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.0
* @precision medium * @precision medium
* @id cpp/toctou-race-condition * @id cpp/toctou-race-condition
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* @id cpp/unsafe-create-process-call * @id cpp/unsafe-create-process-call
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 7.8
* @precision medium * @precision medium
* @msrc.severity important * @msrc.severity important
* @tags security * @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/incorrect-string-type-conversion * @id cpp/incorrect-string-type-conversion
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @tags security * @tags security
* external/cwe/cwe-704 * external/cwe/cwe-704

View File

@@ -3,6 +3,7 @@
* @description Creating a file that is world-writable can allow an attacker to write to the file. * @description Creating a file that is world-writable can allow an attacker to write to the file.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.8
* @precision medium * @precision medium
* @id cpp/world-writable-file-creation * @id cpp/world-writable-file-creation
* @tags security * @tags security

View File

@@ -7,6 +7,7 @@
* @id cpp/unsafe-dacl-security-descriptor * @id cpp/unsafe-dacl-security-descriptor
* @kind problem * @kind problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 7.8
* @precision high * @precision high
* @tags security * @tags security
* external/cwe/cwe-732 * external/cwe/cwe-732

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/infinite-loop-with-unsatisfiable-exit-condition * @id cpp/infinite-loop-with-unsatisfiable-exit-condition
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @tags security * @tags security
* external/cwe/cwe-835 * external/cwe/cwe-835
*/ */

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/redundant-null-check-param * @id cpp/redundant-null-check-param
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 7.5
* @tags reliability * @tags reliability
* security * security
* external/cwe/cwe-476 * external/cwe/cwe-476

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cpp/late-check-of-function-argument * @id cpp/late-check-of-function-argument
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.6
* @precision medium * @precision medium
* @tags correctness * @tags correctness
* security * security

View File

@@ -3,6 +3,7 @@
* @description Use of one of the scanf functions without a specified length. * @description Use of one of the scanf functions without a specified length.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 9.8
* @id cpp/memory-unsafe-function-scan * @id cpp/memory-unsafe-function-scan
* @tags reliability * @tags reliability
* security * security

View File

@@ -3,6 +3,7 @@
* @description Using a multiplication result that may overflow in the size of an allocation may lead to buffer overflows when the allocated memory is used. * @description Using a multiplication result that may overflow in the size of an allocation may lead to buffer overflows when the allocated memory is used.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision low * @precision low
* @tags security * @tags security
* correctness * correctness

View File

@@ -6,6 +6,7 @@
* from these methods is not checked. * from these methods is not checked.
* @kind problem * @kind problem
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 9.8
* @id cpp/drop-linux-privileges-outoforder * @id cpp/drop-linux-privileges-outoforder
* @tags security * @tags security
* external/cwe/cwe-273 * external/cwe/cwe-273

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cpp/memory-leak-on-failed-call-to-realloc * @id cpp/memory-leak-on-failed-call-to-realloc
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @precision medium * @precision medium
* @tags correctness * @tags correctness
* security * security

View File

@@ -3,6 +3,7 @@
* @description Finds empty passwords in configuration files. * @description Finds empty passwords in configuration files.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.1
* @precision medium * @precision medium
* @id cs/empty-password-in-configuration * @id cs/empty-password-in-configuration
* @tags security * @tags security

View File

@@ -3,6 +3,7 @@
* @description Finds passwords in configuration files. * @description Finds passwords in configuration files.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 6.5
* @precision medium * @precision medium
* @id cs/password-in-configuration * @id cs/password-in-configuration
* @tags security * @tags security

View File

@@ -3,6 +3,7 @@
* @description Finds uses of file upload * @description Finds uses of file upload
* @kind problem * @kind problem
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 8.8
* @precision high * @precision high
* @id cs/web/file-upload * @id cs/web/file-upload
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* but under some circumstances may also result in incorrect results. * but under some circumstances may also result in incorrect results.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.0
* @precision medium * @precision medium
* @id cs/thread-unsafe-icryptotransform-field-in-class * @id cs/thread-unsafe-icryptotransform-field-in-class
* @tags concurrency * @tags concurrency

View File

@@ -6,6 +6,7 @@
* but under some circumstances may also result in incorrect results. * but under some circumstances may also result in incorrect results.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.0
* @precision medium * @precision medium
* @id cs/thread-unsafe-icryptotransform-captured-in-lambda * @id cs/thread-unsafe-icryptotransform-captured-in-lambda
* @tags concurrency * @tags concurrency

View File

@@ -4,6 +4,7 @@
* denial-of-service attacks. * denial-of-service attacks.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.1
* @id cs/web/large-max-request-length * @id cs/web/large-max-request-length
* @tags security * @tags security
* frameworks/asp.net * frameworks/asp.net

View File

@@ -3,6 +3,7 @@
* @description ASP.NET pages should not disable the built-in request validation. * @description ASP.NET pages should not disable the built-in request validation.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.1
* @id cs/web/request-validation-disabled * @id cs/web/request-validation-disabled
* @tags security * @tags security
* frameworks/asp.net * frameworks/asp.net

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cs/insecure-request-validation-mode * @id cs/insecure-request-validation-mode
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.1
* @tags security * @tags security
* external/cwe/cwe-016 * external/cwe/cwe-016
*/ */

View File

@@ -4,6 +4,7 @@
* @kind problem * @kind problem
* @id cs/serialization-check-bypass * @id cs/serialization-check-bypass
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.6
* @precision medium * @precision medium
* @tags security * @tags security
* external/cwe/cwe-20 * external/cwe/cwe-20

View File

@@ -5,6 +5,7 @@
* @kind path-problem * @kind path-problem
* @precision low * @precision low
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.6
* @tags security external/cwe/cwe-20 * @tags security external/cwe/cwe-20
*/ */

View File

@@ -3,6 +3,7 @@
* @description Accessing paths influenced by users can allow an attacker to access unexpected resources. * @description Accessing paths influenced by users can allow an attacker to access unexpected resources.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.8
* @precision high * @precision high
* @id cs/path-injection * @id cs/path-injection
* @tags security * @tags security

View File

@@ -6,6 +6,7 @@
* @kind path-problem * @kind path-problem
* @id cs/zipslip * @id cs/zipslip
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.8
* @precision high * @precision high
* @tags security * @tags security
* external/cwe/cwe-022 * external/cwe/cwe-022

View File

@@ -4,6 +4,7 @@
* user to change the meaning of the command. * user to change the meaning of the command.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cs/command-line-injection * @id cs/command-line-injection
* @tags correctness * @tags correctness

View File

@@ -4,6 +4,7 @@
* user to change the meaning of the command. * user to change the meaning of the command.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision medium * @precision medium
* @id cs/stored-command-line-injection * @id cs/stored-command-line-injection
* @tags correctness * @tags correctness

View File

@@ -4,6 +4,7 @@
* scripting vulnerability if the data was originally user-provided. * scripting vulnerability if the data was originally user-provided.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 6.1
* @precision medium * @precision medium
* @id cs/web/stored-xss * @id cs/web/stored-xss
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* allows for a cross-site scripting vulnerability. * allows for a cross-site scripting vulnerability.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 6.1
* @precision high * @precision high
* @id cs/web/xss * @id cs/web/xss
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* of malicious SQL code by the user. * of malicious SQL code by the user.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision medium * @precision medium
* @id cs/second-order-sql-injection * @id cs/second-order-sql-injection
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* malicious SQL code by the user. * malicious SQL code by the user.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cs/sql-injection * @id cs/sql-injection
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* malicious LDAP code by the user. * malicious LDAP code by the user.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 5.4
* @precision high * @precision high
* @id cs/ldap-injection * @id cs/ldap-injection
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* insertion of malicious LDAP code by the user. * insertion of malicious LDAP code by the user.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 5.4
* @precision medium * @precision medium
* @id cs/stored-ldap-injection * @id cs/stored-ldap-injection
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* @kind problem * @kind problem
* @id cs/xml-injection * @id cs/xml-injection
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @tags security * @tags security
* external/cwe/cwe-091 * external/cwe/cwe-091

View File

@@ -4,6 +4,7 @@
* malicious code. * malicious code.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cs/code-injection * @id cs/code-injection
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* malicious user providing an unintended resource. * malicious user providing an unintended resource.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cs/resource-injection * @id cs/resource-injection
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* schema. * schema.
* @kind path-problem * @kind path-problem
* @problem.severity recommendation * @problem.severity recommendation
* @problem.security-severity 4.3
* @precision high * @precision high
* @id cs/xml/missing-validation * @id cs/xml/missing-validation
* @tags security * @tags security

View File

@@ -6,6 +6,7 @@
* @kind problem * @kind problem
* @id cs/assembly-path-injection * @id cs/assembly-path-injection
* @problem.severity error * @problem.severity error
* @problem.security-severity 8.2
* @precision high * @precision high
* @tags security * @tags security
* external/cwe/cwe-114 * external/cwe/cwe-114

View File

@@ -4,6 +4,7 @@
* insertion of forged log entries by a malicious user. * insertion of forged log entries by a malicious user.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 5.3
* @precision high * @precision high
* @id cs/log-forging * @id cs/log-forging
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* to return any value. * to return any value.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 8.8
* @precision high * @precision high
* @id cs/unvalidated-local-pointer-arithmetic * @id cs/unvalidated-local-pointer-arithmetic
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* and cause a denial of service. * and cause a denial of service.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 9.8
* @precision high * @precision high
* @id cs/uncontrolled-format-string * @id cs/uncontrolled-format-string
* @tags security * @tags security

View File

@@ -3,6 +3,7 @@
* @description Transmitting sensitive information to the user is a potential security risk. * @description Transmitting sensitive information to the user is a potential security risk.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 4.3
* @precision high * @precision high
* @id cs/sensitive-data-transmission * @id cs/sensitive-data-transmission
* @tags security * @tags security

View File

@@ -5,6 +5,7 @@
* developing a subsequent exploit. * developing a subsequent exploit.
* @kind path-problem * @kind path-problem
* @problem.severity error * @problem.severity error
* @problem.security-severity 5.3
* @precision high * @precision high
* @id cs/information-exposure-through-exception * @id cs/information-exposure-through-exception
* @tags security * @tags security

View File

@@ -4,6 +4,7 @@
* a global error handler, otherwise they may leak exception information. * a global error handler, otherwise they may leak exception information.
* @kind problem * @kind problem
* @problem.severity warning * @problem.severity warning
* @problem.security-severity 7.5
* @precision high * @precision high
* @id cs/web/missing-global-error-handler * @id cs/web/missing-global-error-handler
* @tags security * @tags security

Some files were not shown because too many files have changed in this diff Show More