We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 4075f57 commit 193c61cCopy full SHA for 193c61c
cpp/config/suites/security/cwe-119
@@ -3,8 +3,8 @@
3
@name Call to memory access function may overflow buffer (CWE-119)
4
+ semmlecode-cpp-queries/Critical/OverflowStatic.ql: /CWE/CWE-119
5
@name Static array access may cause overflow (CWE-119)
6
-# + semmlecode-cpp-queries/Critical/OverflowDestination.ql: /CWE/CWE-119
7
-# ^ disabled due to timeout issue
++ semmlecode-cpp-queries/Critical/OverflowDestination.ql: /CWE/CWE-119
+ @name Copy function using source size (CWE-119)
8
+ semmlecode-cpp-queries/Likely Bugs/Memory Management/SuspiciousCallToStrncat.ql: /CWE/CWE-119
9
@name Potentially unsafe call to strncat (CWE-119)
10
+ semmlecode-cpp-queries/Likely Bugs/Memory Management/StrncpyFlippedArgs.ql: /CWE/CWE-119
0 commit comments