CWE coverage for C and C++ — CodeQL query help documentation
CWE-14
C/C++
cpp/memset-may-be-deleted
Call to
memset may be deleted
CWE-20
C/C++
cpp/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
C/C++
cpp/count-untrusted-data-external-api-ir
Frequency counts for external APIs that are used with untrusted data
CWE-20
C/C++
cpp/untrusted-data-to-external-api-ir
Untrusted data passed to external API
CWE-20
C/C++
cpp/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
C/C++
cpp/uncontrolled-process-operation
Uncontrolled process operation
CWE-20
C/C++
cpp/unclear-array-index-validation
Unclear validation of array index
CWE-20
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-20
C/C++
cpp/late-check-of-function-argument
Late Check Of Function Argument
CWE-20
C/C++
cpp/linux-kernel-no-check-before-unsafe-put-user
Linux kernel no check before unsafe_put_user vulnerability detection
CWE-22
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-23
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-36
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-73
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-74
C/C++
cpp/non-constant-format
Non-constant format string
CWE-74
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-74
C/C++
cpp/cgi-xss
CGI script vulnerable to cross-site scripting
CWE-74
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-74
C/C++
cpp/tainted-format-string
Uncontrolled format string
CWE-74
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-77
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-77
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-78
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-78
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-79
C/C++
cpp/cgi-xss
CGI script vulnerable to cross-site scripting
CWE-88
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-89
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-114
C/C++
cpp/uncontrolled-process-operation
Uncontrolled process operation
CWE-118
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-118
C/C++
cpp/double-free
Potential double free
CWE-118
C/C++
cpp/late-negative-test
Pointer offset used before it is checked
CWE-118
C/C++
cpp/missing-negativity-test
Unchecked return value used as offset
CWE-118
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-118
C/C++
cpp/overflow-destination
Copy function using source size
CWE-118
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-118
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-118
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-118
C/C++
cpp/use-after-free
Potential use after free
CWE-118
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-118
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-118
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-118
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-118
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-118
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-118
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-118
C/C++
cpp/overrun-write
Overrunning write
CWE-118
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-118
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-118
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-118
C/C++
cpp/unbounded-write
Unbounded write
CWE-118
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-118
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-118
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-118
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-118
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-118
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-118
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-118
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-118
C/C++
cpp/memory-unsafe-function-scan
Scanf function without a specified length
CWE-118
C/C++
cpp/dangerous-use-convert-function
Dangerous use convert function
CWE-118
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-118
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-118
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-118
C/C++
cpp/sign-conversion-pointer-arithmetic
unsigned to signed used in pointer arithmetic
CWE-118
C/C++
cpp/access-memory-location-after-end-buffer-strlen
Access Of Memory Location After End Of Buffer
CWE-118
C/C++
cpp/buffer-access-with-incorrect-length-value
Buffer access with incorrect length value
CWE-119
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-119
C/C++
cpp/double-free
Potential double free
CWE-119
C/C++
cpp/late-negative-test
Pointer offset used before it is checked
CWE-119
C/C++
cpp/missing-negativity-test
Unchecked return value used as offset
CWE-119
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-119
C/C++
cpp/overflow-destination
Copy function using source size
CWE-119
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-119
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-119
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-119
C/C++
cpp/use-after-free
Potential use after free
CWE-119
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-119
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-119
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-119
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-119
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-119
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-119
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-119
C/C++
cpp/overrun-write
Overrunning write
CWE-119
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-119
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-119
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-119
C/C++
cpp/unbounded-write
Unbounded write
CWE-119
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-119
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-119
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-119
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-119
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-119
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-119
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-119
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-119
C/C++
cpp/memory-unsafe-function-scan
Scanf function without a specified length
CWE-119
C/C++
cpp/dangerous-use-convert-function
Dangerous use convert function
CWE-119
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-119
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-119
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-119
C/C++
cpp/sign-conversion-pointer-arithmetic
unsigned to signed used in pointer arithmetic
CWE-119
C/C++
cpp/access-memory-location-after-end-buffer-strlen
Access Of Memory Location After End Of Buffer
CWE-119
C/C++
cpp/buffer-access-with-incorrect-length-value
Buffer access with incorrect length value
CWE-120
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-120
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-120
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-120
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-120
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-120
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-120
C/C++
cpp/unbounded-write
Unbounded write
CWE-120
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-120
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-120
C/C++
cpp/memory-unsafe-function-scan
Scanf function without a specified length
CWE-121
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-121
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-122
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-122
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-122
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-122
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-125
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-125
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-125
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-125
C/C++
cpp/dangerous-use-convert-function
Dangerous use convert function
CWE-126
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-128
C/C++
cpp/signed-overflow-check
Signed overflow check
CWE-128
C/C++
cpp/multiplication-overflow-in-alloc
Multiplication result may overflow and be used in allocation
CWE-129
C/C++
cpp/unclear-array-index-validation
Unclear validation of array index
CWE-131
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-131
C/C++
cpp/overflow-destination
Copy function using source size
CWE-131
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-131
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-131
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-131
C/C++
cpp/overrun-write
Overrunning write
CWE-131
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-134
C/C++
cpp/non-constant-format
Non-constant format string
CWE-134
C/C++
cpp/tainted-format-string
Uncontrolled format string
CWE-170
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-170
C/C++
cpp/user-controlled-null-termination-tainted
User-controlled data may not be null terminated
CWE-190
C/C++
cpp/ambiguously-signed-bit-field
Ambiguously signed bit-field member
CWE-190
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-190
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-190
C/C++
cpp/signed-overflow-check
Signed overflow check
CWE-190
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-190
C/C++
cpp/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-190
C/C++
cpp/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-190
C/C++
cpp/arithmetic-with-extreme-values
Use of extreme values in arithmetic expression
CWE-190
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-190
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-190
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-190
C/C++
cpp/multiplication-overflow-in-alloc
Multiplication result may overflow and be used in allocation
CWE-190
C/C++
cpp/dangerous-use-of-transformation-after-operation
Dangerous use of transformation after operation
CWE-190
C/C++
cpp/signed-bit-field
Possible signed bit-field member
CWE-191
C/C++
cpp/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-191
C/C++
cpp/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-191
C/C++
cpp/arithmetic-with-extreme-values
Use of extreme values in arithmetic expression
CWE-191
C/C++
cpp/unsigned-difference-expression-compared-zero
Unsigned difference expression compared to zero
CWE-193
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-197
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-197
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-197
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-200
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-200
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-200
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-200
C/C++
cpp/work-with-file-without-permissions-rights
Writing to a file without setting permissions
CWE-200
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-200
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-227
C/C++
cpp/double-free
Potential double free
CWE-227
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-227
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-227
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-227
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-227
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-227
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-227
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-227
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-227
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-227
C/C++
cpp/twice-locked
Mutex locked twice
CWE-227
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-227
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-227
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-227
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-227
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-227
C/C++
cpp/double-release
Errors When Double Release
CWE-228
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-228
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-233
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-233
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-234
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-234
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-242
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-243
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-248
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-252
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-252
C/C++
cpp/return-value-ignored
Return value of a function is ignored
CWE-252
C/C++
cpp/inconsistent-call-on-result
Inconsistent operation on return value
CWE-252
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-252
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-252
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-253
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-253
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-253
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-253
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-260
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-266
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-269
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-269
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-271
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-273
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-284
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-284
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-284
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-284
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-284
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-284
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-284
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-284
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-285
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-285
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-285
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-285
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-287
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-287
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-290
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-295
C/C++
cpp/certificate-result-conflation
Certificate result conflation
CWE-295
C/C++
cpp/certificate-not-checked
Certificate not checked
CWE-295
C/C++
cpp/curl-disabled-ssl
Disabled certifcate verification
CWE-311
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-311
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-311
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-311
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-311
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-312
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-312
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-312
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-313
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-313
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-319
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-319
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-326
C/C++
cpp/boost/tls-settings-misconfiguration
boost::asio TLS settings misconfiguration
CWE-326
C/C++
cpp/insufficient-key-size
Use of a cryptographic algorithm with insufficient key size
CWE-326
C/C++
cpp/unknown-asymmetric-key-gen-size
Unknown key generation key size
CWE-326
C/C++
cpp/weak-asymmetric-key-gen-size
Weak asymmetric key generation key size (< 2048 bits)
CWE-327
C/C++
cpp/boost/use-of-deprecated-hardcoded-security-protocol
boost::asio use of deprecated hardcoded protocol
CWE-327
C/C++
cpp/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-327
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-327
C/C++
cpp/weak-block-mode
Weak block mode
CWE-327
C/C++
cpp/weak-elliptic-curve
Weak elliptic curve
CWE-327
C/C++
cpp/weak-crypto/banned-encryption-algorithms
Weak cryptography
CWE-327
C/C++
cpp/weak-crypto/banned-hash-algorithms
Weak cryptography
CWE-345
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-359
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-359
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-362
C/C++
cpp/toctou-race-condition
Time-of-check time-of-use filesystem race condition
CWE-362
C/C++
cpp/linux-kernel-double-fetch-vulnerability
Linux kernel double-fetch vulnerability detection
CWE-367
C/C++
cpp/toctou-race-condition
Time-of-check time-of-use filesystem race condition
CWE-369
C/C++
cpp/divide-by-zero-using-return-value
Divide by zero using return value
CWE-377
C/C++
cpp/insecure-generation-of-filename
Insecure generation of filenames
CWE-390
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-398
C/C++
cpp/unused-local-variable
Unused local variable
CWE-398
C/C++
cpp/unused-static-function
Unused static function
CWE-398
C/C++
cpp/unused-static-variable
Unused static variable
CWE-398
C/C++
cpp/dead-code-condition
Branching condition always evaluates to same value
CWE-398
C/C++
cpp/dead-code-function
Function is never called
CWE-398
C/C++
cpp/dead-code-goto
Dead code due to goto or break statement
CWE-398
C/C++
cpp/inconsistent-nullness-testing
Inconsistent null check of pointer
CWE-398
C/C++
cpp/missing-null-test
Returned pointer not checked
CWE-398
C/C++
cpp/unused-variable
Variable is assigned a value that is never read
CWE-398
C/C++
cpp/fixme-comment
FIXME comment
CWE-398
C/C++
cpp/todo-comment
TODO comment
CWE-398
C/C++
cpp/inconsistent-null-check
Inconsistent nullness check
CWE-398
C/C++
cpp/useless-expression
Expression has no effect
CWE-398
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-398
C/C++
cpp/suspicious-call-to-memset
Suspicious call to memset
CWE-398
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-398
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-398
C/C++
cpp/redundant-null-check-simple
Redundant null check due to previous dereference
CWE-398
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-398
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-398
C/C++
cpp/dangerous-cin
Dangerous use of 'cin'
CWE-398
C/C++
cpp/potentially-dangerous-function
Use of potentially dangerous function
CWE-398
C/C++
cpp/deref-null-result
Null dereference from a function result
CWE-398
C/C++
cpp/redundant-null-check-param
Redundant null check or missing null check of parameter
CWE-398
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-398
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-400
C/C++
cpp/catch-missing-free
Leaky catch
CWE-400
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-400
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-400
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-400
C/C++
cpp/file-never-closed
Open file is not closed
CWE-400
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-400
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-400
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-400
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-400
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-400
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-401
C/C++
cpp/catch-missing-free
Leaky catch
CWE-401
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-401
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-401
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-401
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-404
C/C++
cpp/catch-missing-free
Leaky catch
CWE-404
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-404
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-404
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-404
C/C++
cpp/file-never-closed
Open file is not closed
CWE-404
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-404
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-404
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-404
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-404
C/C++
cpp/resource-not-released-in-destructor
Resource not released in destructor
CWE-405
C/C++
cpp/data-decompression-bomb
User-controlled file decompression
CWE-409
C/C++
cpp/data-decompression-bomb
User-controlled file decompression
CWE-415
C/C++
cpp/double-free
Potential double free
CWE-415
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-415
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-416
C/C++
cpp/use-after-free
Potential use after free
CWE-416
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-416
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-416
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-416
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-428
C/C++
cpp/unsafe-create-process-call
NULL application name with an unquoted path in call to CreateProcess
CWE-435
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-456
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-457
C/C++
cpp/global-use-before-init
Global variable may be used before initialization
CWE-457
C/C++
cpp/not-initialised
Variable not initialized before use
CWE-457
C/C++
cpp/uninitialized-local
Potentially uninitialized local variable
CWE-457
C/C++
cpp/conditionally-uninitialized-variable
Conditionally uninitialized variable
CWE-467
C/C++
cpp/suspicious-sizeof
Suspicious 'sizeof' use
CWE-468
C/C++
cpp/suspicious-pointer-scaling
Suspicious pointer scaling
CWE-468
C/C++
cpp/incorrect-pointer-scaling-char
Suspicious pointer scaling to char
CWE-468
C/C++
cpp/suspicious-pointer-scaling-void
Suspicious pointer scaling to void
CWE-468
C/C++
cpp/suspicious-add-sizeof
Suspicious add with sizeof
CWE-476
C/C++
cpp/inconsistent-nullness-testing
Inconsistent null check of pointer
CWE-476
C/C++
cpp/missing-null-test
Returned pointer not checked
CWE-476
C/C++
cpp/inconsistent-null-check
Inconsistent nullness check
CWE-476
C/C++
cpp/redundant-null-check-simple
Redundant null check due to previous dereference
CWE-476
C/C++
cpp/deref-null-result
Null dereference from a function result
CWE-476
C/C++
cpp/redundant-null-check-param
Redundant null check or missing null check of parameter
CWE-476
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-478
C/C++
cpp/missing-case-in-switch
Missing enum case in switch
CWE-478
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-480
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-480
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-480
C/C++
cpp/incorrect-not-operator-usage
Incorrect 'not' operator usage
CWE-480
C/C++
cpp/logical-operator-applied-to-flag
Short-circuiting operator applied to flag
CWE-480
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-480
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-481
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-482
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-497
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-497
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-522
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-546
C/C++
cpp/fixme-comment
FIXME comment
CWE-546
C/C++
cpp/todo-comment
TODO comment
CWE-560
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-561
C/C++
cpp/unused-static-function
Unused static function
CWE-561
C/C++
cpp/dead-code-condition
Branching condition always evaluates to same value
CWE-561
C/C++
cpp/dead-code-function
Function is never called
CWE-561
C/C++
cpp/dead-code-goto
Dead code due to goto or break statement
CWE-561
C/C++
cpp/useless-expression
Expression has no effect
CWE-561
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-561
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-563
C/C++
cpp/unused-local-variable
Unused local variable
CWE-563
C/C++
cpp/unused-static-variable
Unused static variable
CWE-563
C/C++
cpp/unused-variable
Variable is assigned a value that is never read
CWE-570
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-573
C/C++
cpp/double-free
Potential double free
CWE-573
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-573
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-573
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-573
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-573
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-573
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-573
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-573
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-573
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-573
C/C++
cpp/twice-locked
Mutex locked twice
CWE-573
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-573
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-573
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-573
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-573
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-573
C/C++
cpp/double-release
Errors When Double Release
CWE-592
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-610
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-610
C/C++
cpp/external-entity-expansion
XML external entity expansion
CWE-611
C/C++
cpp/external-entity-expansion
XML external entity expansion
CWE-628
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-628
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-628
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-628
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-642
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-662
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-662
C/C++
cpp/twice-locked
Mutex locked twice
CWE-662
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-664
C/C++
cpp/catch-missing-free
Leaky catch
CWE-664
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-664
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-664
C/C++
cpp/double-free
Potential double free
CWE-664
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-664
C/C++
cpp/file-never-closed
Open file is not closed
CWE-664
C/C++
cpp/global-use-before-init
Global variable may be used before initialization
CWE-664
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-664
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-664
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-664
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-664
C/C++
cpp/not-initialised
Variable not initialized before use
CWE-664
C/C++
cpp/use-after-free
Potential use after free
CWE-664
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-664
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-664
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-664
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-664
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-664
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-664
C/C++
cpp/uninitialized-local
Potentially uninitialized local variable
CWE-664
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-664
C/C++
cpp/self-assignment-check
Self assignment check
CWE-664
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-664
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-664
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-664
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-664
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-664
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-664
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-664
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-664
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-664
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-664
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-664
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-664
C/C++
cpp/unsafe-create-process-call
NULL application name with an unquoted path in call to CreateProcess
CWE-664
C/C++
cpp/conditionally-uninitialized-variable
Conditionally uninitialized variable
CWE-664
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-664
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-664
C/C++
cpp/external-entity-expansion
XML external entity expansion
CWE-664
C/C++
cpp/incorrect-string-type-conversion
Cast from char to wchar_t
CWE-664
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-664
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-664
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-664
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-664
C/C++
cpp/twice-locked
Mutex locked twice
CWE-664
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-664
C/C++
cpp/type-confusion
Type confusion
CWE-664
C/C++
cpp/work-with-file-without-permissions-rights
Writing to a file without setting permissions
CWE-664
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-664
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-664
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-664
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-664
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-664
C/C++
cpp/insecure-generation-of-filename
Insecure generation of filenames
CWE-664
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-664
C/C++
cpp/data-decompression-bomb
User-controlled file decompression
CWE-664
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-664
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-664
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-664
C/C++
cpp/double-release
Errors When Double Release
CWE-664
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-664
C/C++
cpp/resource-not-released-in-destructor
Resource not released in destructor
CWE-665
C/C++
cpp/global-use-before-init
Global variable may be used before initialization
CWE-665
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-665
C/C++
cpp/not-initialised
Variable not initialized before use
CWE-665
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-665
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-665
C/C++
cpp/uninitialized-local
Potentially uninitialized local variable
CWE-665
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-665
C/C++
cpp/conditionally-uninitialized-variable
Conditionally uninitialized variable
CWE-666
C/C++
cpp/double-free
Potential double free
CWE-666
C/C++
cpp/use-after-free
Potential use after free
CWE-666
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-666
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-666
C/C++
cpp/self-assignment-check
Self assignment check
CWE-666
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-666
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-666
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-666
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-666
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-666
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-666
C/C++
cpp/double-release
Errors When Double Release
CWE-667
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-667
C/C++
cpp/twice-locked
Mutex locked twice
CWE-667
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-668
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-668
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-668
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-668
C/C++
cpp/unsafe-create-process-call
NULL application name with an unquoted path in call to CreateProcess
CWE-668
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-668
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-668
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-668
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-668
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-668
C/C++
cpp/work-with-file-without-permissions-rights
Writing to a file without setting permissions
CWE-668
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-668
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-668
C/C++
cpp/insecure-generation-of-filename
Insecure generation of filenames
CWE-669
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-670
C/C++
cpp/comma-before-misleading-indentation
Comma before misleading indentation
CWE-670
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-670
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-670
C/C++
cpp/incorrect-not-operator-usage
Incorrect 'not' operator usage
CWE-670
C/C++
cpp/logical-operator-applied-to-flag
Short-circuiting operator applied to flag
CWE-670
C/C++
cpp/unsafe-use-of-this
Unsafe use of this in constructor
CWE-670
C/C++
cpp/dangerous-use-of-ssl-shutdown
Dangerous use SSL_shutdown
CWE-670
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-670
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-672
C/C++
cpp/double-free
Potential double free
CWE-672
C/C++
cpp/use-after-free
Potential use after free
CWE-672
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-672
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-672
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-672
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-672
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-672
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-672
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-672
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-675
C/C++
cpp/double-free
Potential double free
CWE-675
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-675
C/C++
cpp/twice-locked
Mutex locked twice
CWE-675
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-675
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-675
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-675
C/C++
cpp/double-release
Errors When Double Release
CWE-676
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-676
C/C++
cpp/suspicious-call-to-memset
Suspicious call to memset
CWE-676
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-676
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-676
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-676
C/C++
cpp/dangerous-cin
Dangerous use of 'cin'
CWE-676
C/C++
cpp/potentially-dangerous-function
Use of potentially dangerous function
CWE-681
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-681
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-681
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-681
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-682
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-682
C/C++
cpp/overflow-destination
Copy function using source size
CWE-682
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-682
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-682
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-682
C/C++
cpp/ambiguously-signed-bit-field
Ambiguously signed bit-field member
CWE-682
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-682
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-682
C/C++
cpp/signed-overflow-check
Signed overflow check
CWE-682
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-682
C/C++
cpp/suspicious-sizeof
Suspicious 'sizeof' use
CWE-682
C/C++
cpp/overrun-write
Overrunning write
CWE-682
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-682
C/C++
cpp/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-682
C/C++
cpp/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-682
C/C++
cpp/arithmetic-with-extreme-values
Use of extreme values in arithmetic expression
CWE-682
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-682
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-682
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-682
C/C++
cpp/unsigned-difference-expression-compared-zero
Unsigned difference expression compared to zero
CWE-682
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-682
C/C++
cpp/suspicious-pointer-scaling
Suspicious pointer scaling
CWE-682
C/C++
cpp/incorrect-pointer-scaling-char
Suspicious pointer scaling to char
CWE-682
C/C++
cpp/suspicious-pointer-scaling-void
Suspicious pointer scaling to void
CWE-682
C/C++
cpp/suspicious-add-sizeof
Suspicious add with sizeof
CWE-682
C/C++
cpp/multiplication-overflow-in-alloc
Multiplication result may overflow and be used in allocation
CWE-682
C/C++
cpp/dangerous-use-of-transformation-after-operation
Dangerous use of transformation after operation
CWE-682
C/C++
cpp/divide-by-zero-using-return-value
Divide by zero using return value
CWE-682
C/C++
cpp/signed-bit-field
Possible signed bit-field member
CWE-685
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-685
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-686
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-687
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-691
C/C++
cpp/comma-before-misleading-indentation
Comma before misleading indentation
CWE-691
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-691
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-691
C/C++
cpp/incorrect-not-operator-usage
Incorrect 'not' operator usage
CWE-691
C/C++
cpp/logical-operator-applied-to-flag
Short-circuiting operator applied to flag
CWE-691
C/C++
cpp/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-691
C/C++
cpp/unsafe-use-of-this
Unsafe use of this in constructor
CWE-691
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-691
C/C++
cpp/toctou-race-condition
Time-of-check time-of-use filesystem race condition
CWE-691
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-691
C/C++
cpp/twice-locked
Mutex locked twice
CWE-691
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-691
C/C++
cpp/infinite-loop-with-unsatisfiable-exit-condition
Infinite loop with unsatisfiable exit condition
CWE-691
C/C++
cpp/linux-kernel-double-fetch-vulnerability
Linux kernel double-fetch vulnerability detection
CWE-691
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-691
C/C++
cpp/dangerous-use-of-ssl-shutdown
Dangerous use SSL_shutdown
CWE-691
C/C++
cpp/errors-after-refactoring
Errors After Refactoring
CWE-691
C/C++
cpp/errors-when-using-bit-operations
Errors When Using Bit Operations
CWE-691
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-691
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-691
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-693
C/C++
cpp/boost/tls-settings-misconfiguration
boost::asio TLS settings misconfiguration
CWE-693
C/C++
cpp/boost/use-of-deprecated-hardcoded-security-protocol
boost::asio use of deprecated hardcoded protocol
CWE-693
C/C++
cpp/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
C/C++
cpp/count-untrusted-data-external-api-ir
Frequency counts for external APIs that are used with untrusted data
CWE-693
C/C++
cpp/untrusted-data-to-external-api-ir
Untrusted data passed to external API
CWE-693
C/C++
cpp/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
C/C++
cpp/uncontrolled-process-operation
Uncontrolled process operation
CWE-693
C/C++
cpp/unclear-array-index-validation
Unclear validation of array index
CWE-693
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-693
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-693
C/C++
cpp/certificate-result-conflation
Certificate result conflation
CWE-693
C/C++
cpp/certificate-not-checked
Certificate not checked
CWE-693
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-693
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-693
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-693
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-693
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-693
C/C++
cpp/insufficient-key-size
Use of a cryptographic algorithm with insufficient key size
CWE-693
C/C++
cpp/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-693
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-693
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-693
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-693
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-693
C/C++
cpp/tainted-permissions-check
Untrusted input for a condition
CWE-693
C/C++
cpp/late-check-of-function-argument
Late Check Of Function Argument
CWE-693
C/C++
cpp/linux-kernel-no-check-before-unsafe-put-user
Linux kernel no check before unsafe_put_user vulnerability detection
CWE-693
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-693
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-693
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-693
C/C++
cpp/curl-disabled-ssl
Disabled certifcate verification
CWE-693
C/C++
cpp/unknown-asymmetric-key-gen-size
Unknown key generation key size
CWE-693
C/C++
cpp/weak-asymmetric-key-gen-size
Weak asymmetric key generation key size (< 2048 bits)
CWE-693
C/C++
cpp/weak-block-mode
Weak block mode
CWE-693
C/C++
cpp/weak-elliptic-curve
Weak elliptic curve
CWE-693
C/C++
cpp/weak-crypto/banned-encryption-algorithms
Weak cryptography
CWE-693
C/C++
cpp/weak-crypto/banned-hash-algorithms
Weak cryptography
CWE-697
C/C++
cpp/missing-case-in-switch
Missing enum case in switch
CWE-697
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-703
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-703
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-703
C/C++
cpp/return-value-ignored
Return value of a function is ignored
CWE-703
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-703
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-703
C/C++
cpp/inconsistent-call-on-result
Inconsistent operation on return value
CWE-703
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-703
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-703
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-703
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-703
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-703
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-703
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-703
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-704
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-704
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-704
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-704
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-704
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-704
C/C++
cpp/incorrect-string-type-conversion
Cast from char to wchar_t
CWE-704
C/C++
cpp/type-confusion
Type confusion
CWE-705
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-706
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-707
C/C++
cpp/non-constant-format
Non-constant format string
CWE-707
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-707
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-707
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-707
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-707
C/C++
cpp/cgi-xss
CGI script vulnerable to cross-site scripting
CWE-707
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-707
C/C++
cpp/tainted-format-string
Uncontrolled format string
CWE-707
C/C++
cpp/user-controlled-null-termination-tainted
User-controlled data may not be null terminated
CWE-707
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-710
C/C++
cpp/unused-local-variable
Unused local variable
CWE-710
C/C++
cpp/unused-static-function
Unused static function
CWE-710
C/C++
cpp/unused-static-variable
Unused static variable
CWE-710
C/C++
cpp/dead-code-condition
Branching condition always evaluates to same value
CWE-710
C/C++
cpp/dead-code-function
Function is never called
CWE-710
C/C++
cpp/dead-code-goto
Dead code due to goto or break statement
CWE-710
C/C++
cpp/double-free
Potential double free
CWE-710
C/C++
cpp/inconsistent-nullness-testing
Inconsistent null check of pointer
CWE-710
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-710
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-710
C/C++
cpp/missing-null-test
Returned pointer not checked
CWE-710
C/C++
cpp/unused-variable
Variable is assigned a value that is never read
CWE-710
C/C++
cpp/fixme-comment
FIXME comment
CWE-710
C/C++
cpp/todo-comment
TODO comment
CWE-710
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-710
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-710
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-710
C/C++
cpp/inconsistent-null-check
Inconsistent nullness check
CWE-710
C/C++
cpp/useless-expression
Expression has no effect
CWE-710
C/C++
cpp/pointer-overflow-check
Pointer overflow check
CWE-710
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-710
C/C++
cpp/suspicious-call-to-memset
Suspicious call to memset
CWE-710
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-710
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-710
C/C++
cpp/redundant-null-check-simple
Redundant null check due to previous dereference
CWE-710
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-710
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-710
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-710
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-710
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-710
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-710
C/C++
cpp/dangerous-cin
Dangerous use of 'cin'
CWE-710
C/C++
cpp/potentially-dangerous-function
Use of potentially dangerous function
CWE-710
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-710
C/C++
cpp/twice-locked
Mutex locked twice
CWE-710
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-710
C/C++
cpp/deref-null-result
Null dereference from a function result
CWE-710
C/C++
cpp/redundant-null-check-param
Redundant null check or missing null check of parameter
CWE-710
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-710
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-710
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-710
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-710
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-710
C/C++
cpp/double-release
Errors When Double Release
CWE-710
C/C++
cpp/errors-of-undefined-program-behavior
Errors Of Undefined Program Behavior
CWE-732
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-732
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-732
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-733
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-754
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-754
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-754
C/C++
cpp/return-value-ignored
Return value of a function is ignored
CWE-754
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-754
C/C++
cpp/inconsistent-call-on-result
Inconsistent operation on return value
CWE-754
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-754
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-754
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-754
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-754
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-754
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-755
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-755
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-758
C/C++
cpp/pointer-overflow-check
Pointer overflow check
CWE-758
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-758
C/C++
cpp/errors-of-undefined-program-behavior
Errors Of Undefined Program Behavior
CWE-764
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-764
C/C++
cpp/twice-locked
Mutex locked twice
CWE-764
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-770
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-770
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-772
C/C++
cpp/catch-missing-free
Leaky catch
CWE-772
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-772
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-772
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-772
C/C++
cpp/file-never-closed
Open file is not closed
CWE-772
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-772
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-772
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-772
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-775
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-775
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-775
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-775
C/C++
cpp/file-never-closed
Open file is not closed
CWE-783
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-783
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-787
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-787
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-787
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-787
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-787
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-787
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-787
C/C++
cpp/unbounded-write
Unbounded write
CWE-787
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-787
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-787
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-787
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-787
C/C++
cpp/sign-conversion-pointer-arithmetic
unsigned to signed used in pointer arithmetic
CWE-788
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-788
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-788
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-788
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-788
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-788
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-788
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-788
C/C++
cpp/access-memory-location-after-end-buffer-strlen
Access Of Memory Location After End Of Buffer
CWE-789
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-805
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-805
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-805
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-805
C/C++
cpp/unbounded-write
Unbounded write
CWE-805
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-805
C/C++
cpp/buffer-access-with-incorrect-length-value
Buffer access with incorrect length value
CWE-807
C/C++
cpp/tainted-permissions-check
Untrusted input for a condition
CWE-823
C/C++
cpp/late-negative-test
Pointer offset used before it is checked
CWE-823
C/C++
cpp/missing-negativity-test
Unchecked return value used as offset
CWE-825
C/C++
cpp/double-free
Potential double free
CWE-825
C/C++
cpp/use-after-free
Potential use after free
CWE-825
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-825
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-825
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-825
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-825
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-825
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-825
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-825
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-826
C/C++
cpp/self-assignment-check
Self assignment check
CWE-833
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-833
C/C++
cpp/twice-locked
Mutex locked twice
CWE-833
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-834
C/C++
cpp/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-834
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-834
C/C++
cpp/infinite-loop-with-unsatisfiable-exit-condition
Infinite loop with unsatisfiable exit condition
CWE-835
C/C++
cpp/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-835
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-835
C/C++
cpp/infinite-loop-with-unsatisfiable-exit-condition
Infinite loop with unsatisfiable exit condition
CWE-843
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-843
C/C++
cpp/type-confusion
Type confusion
CWE-908
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-909
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-922
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-922
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-922
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-943
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-1041
C/C++
cpp/call-to-function-without-wrapper
Missed opportunity to call wrapper function
CWE-1078
C/C++
cpp/comma-before-misleading-indentation
Comma before misleading indentation
CWE-1126
C/C++
cpp/errors-when-using-variable-declaration-inside-loop
Errors When Using Variable Declaration Inside Loop
CWE-1240
C/C++
cpp/crypto-primitive
Implementation of a cryptographic primitive