We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
2 parents 1be9762 + 193c61c commit 010bb61Copy full SHA for 010bb61
cpp/config/suites/security/cwe-119
@@ -3,8 +3,8 @@
3
@name Call to memory access function may overflow buffer (CWE-119)
4
+ semmlecode-cpp-queries/Critical/OverflowStatic.ql: /CWE/CWE-119
5
@name Static array access may cause overflow (CWE-119)
6
-# + semmlecode-cpp-queries/Critical/OverflowDestination.ql: /CWE/CWE-119
7
-# ^ disabled due to timeout issue
++ semmlecode-cpp-queries/Critical/OverflowDestination.ql: /CWE/CWE-119
+ @name Copy function using source size (CWE-119)
8
+ semmlecode-cpp-queries/Likely Bugs/Memory Management/SuspiciousCallToStrncat.ql: /CWE/CWE-119
9
@name Potentially unsafe call to strncat (CWE-119)
10
+ semmlecode-cpp-queries/Likely Bugs/Memory Management/StrncpyFlippedArgs.ql: /CWE/CWE-119
0 commit comments