Skip to content

Commit

Permalink
Bump CWE dictionary to v4.13 (#713)
Browse files Browse the repository at this point in the history
  • Loading branch information
nscuro authored Jun 11, 2024
1 parent 19e4f91 commit 06301ab
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@
import java.util.LinkedHashMap;
import java.util.Map;

@Generated(value = "From dictionary version 4.12")
@Generated(value = "From dictionary version 4.13")
public final class CweDictionary {

public static final Map<Integer, String> DICTIONARY = new LinkedHashMap<>();
Expand Down Expand Up @@ -1215,7 +1215,7 @@ public final class CweDictionary {
DICTIONARY.put(1185, "SEI CERT Perl Coding Standard - Guidelines 07. File Input and Output (FIO)");
DICTIONARY.put(1186, "SEI CERT Perl Coding Standard - Guidelines 50. Miscellaneous (MSC)");
DICTIONARY.put(1187, "DEPRECATED: Use of Uninitialized Resource");
DICTIONARY.put(1188, "Insecure Default Initialization of Resource");
DICTIONARY.put(1188, "Initialization of a Resource with an Insecure Default");
DICTIONARY.put(1189, "Improper Isolation of Shared Resources on System-on-a-Chip (SoC)");
DICTIONARY.put(1190, "DMA Device Enabled Too Early in Boot Phase");
DICTIONARY.put(1191, "On-Chip Debug and Test Interface With Improper Access Control");
Expand Down Expand Up @@ -1446,6 +1446,7 @@ public final class CweDictionary {
DICTIONARY.put(1416, "Comprehensive Categorization: Resource Lifecycle Management");
DICTIONARY.put(1417, "Comprehensive Categorization: Sensitive Information Exposure");
DICTIONARY.put(1418, "Comprehensive Categorization: Violation of Secure Design Principles");
DICTIONARY.put(1419, "Incorrect Initialization of Resource");
DICTIONARY.put(1425, "Weaknesses in the 2023 CWE Top 25 Most Dangerous Software Weaknesses");
DICTIONARY.put(2000, "Comprehensive CWE Dictionary");
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ public void getCwesTest() {
.header(X_API_KEY, apiKey)
.get(Response.class);
Assert.assertEquals(200, response.getStatus(), 0);
Assert.assertEquals(String.valueOf(1420), response.getHeaderString(TOTAL_COUNT_HEADER));
Assert.assertEquals(String.valueOf(1421), response.getHeaderString(TOTAL_COUNT_HEADER));
JsonArray json = parseJsonArray(response);
Assert.assertNotNull(json);
Assert.assertEquals(100, json.size());
Expand Down

0 comments on commit 06301ab

Please sign in to comment.