Skip to content

Commit a84a68d

Browse files
SONARJAVA-4953 Update External Linters Metadata (#4779)
1 parent 4f190d2 commit a84a68d

2 files changed

Lines changed: 67 additions & 0 deletions

File tree

external-reports/src/main/resources/org/sonar/l10n/java/rules/spotbugs/findsecbugs-rules.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -371,6 +371,12 @@
371371
"type": "VULNERABILITY",
372372
"url": "https://find-sec-bugs.github.io/bugs.htm#PLAY_UNVALIDATED_REDIRECT"
373373
},
374+
{
375+
"key": "POTENTIAL_XML_INJECTION",
376+
"name": "An unsafe string is potentially injected into an XML string",
377+
"type": "VULNERABILITY",
378+
"url": "https://find-sec-bugs.github.io/bugs.htm#POTENTIAL_XML_INJECTION"
379+
},
374380
{
375381
"key": "PREDICTABLE_RANDOM",
376382
"name": "Predictable pseudorandom number generator",
@@ -821,6 +827,18 @@
821827
"type": "VULNERABILITY",
822828
"url": "https://find-sec-bugs.github.io/bugs.htm#XXE_SAXPARSER"
823829
},
830+
{
831+
"key": "XXE_SCHEMA_FACTORY",
832+
"name": "XML schema processing vulnerable to XXE",
833+
"type": "VULNERABILITY",
834+
"url": "https://find-sec-bugs.github.io/bugs.htm#XXE_SCHEMA_FACTORY"
835+
},
836+
{
837+
"key": "XXE_VALIDATOR",
838+
"name": "XML validation vulnerable to XXE",
839+
"type": "VULNERABILITY",
840+
"url": "https://find-sec-bugs.github.io/bugs.htm#XXE_VALIDATOR"
841+
},
824842
{
825843
"key": "XXE_XMLREADER",
826844
"name": "XML parsing vulnerable to XXE (XMLReader)",

external-reports/src/main/resources/org/sonar/l10n/java/rules/spotbugs/spotbugs-rules.json

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1623,6 +1623,13 @@
16231623
"severity": "MAJOR",
16241624
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#mc-overridable-method-call-in-constructor"
16251625
},
1626+
{
1627+
"key": "MC_OVERRIDABLE_METHOD_CALL_IN_READ_OBJECT",
1628+
"name": "Malicious code - An overridable method is called from the readObject method.",
1629+
"type": "CODE_SMELL",
1630+
"severity": "MAJOR",
1631+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#mc-overridable-method-call-in-read-object"
1632+
},
16261633
{
16271634
"key": "ME_ENUM_FIELD_SETTER",
16281635
"name": "Bad practice - Public enum method unconditionally sets its field",
@@ -2876,6 +2883,48 @@
28762883
"severity": "MAJOR",
28772884
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sic-threadlocal-deadly-embrace"
28782885
},
2886+
{
2887+
"key": "SING_SINGLETON_GETTER_NOT_SYNCHRONIZED",
2888+
"name": "Correctness - Instance-getter method of class using singleton design pattern is not synchronized.",
2889+
"type": "BUG",
2890+
"severity": "MAJOR",
2891+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sing-singleton-getter-not-synchronized"
2892+
},
2893+
{
2894+
"key": "SING_SINGLETON_HAS_NONPRIVATE_CONSTRUCTOR",
2895+
"name": "Correctness - Class using singleton design pattern has non-private constructor.",
2896+
"type": "BUG",
2897+
"severity": "MAJOR",
2898+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sing-singleton-has-nonprivate-constructor"
2899+
},
2900+
{
2901+
"key": "SING_SINGLETON_IMPLEMENTS_CLONEABLE",
2902+
"name": "Correctness - Class using singleton design pattern directly implements Cloneable interface.",
2903+
"type": "BUG",
2904+
"severity": "MAJOR",
2905+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sing-singleton-implements-cloneable"
2906+
},
2907+
{
2908+
"key": "SING_SINGLETON_IMPLEMENTS_CLONE_METHOD",
2909+
"name": "Correctness - Class using singleton design pattern implements clone() method without being an unconditional CloneNotSupportedException-thrower.",
2910+
"type": "BUG",
2911+
"severity": "MAJOR",
2912+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sing-singleton-implements-clone-method"
2913+
},
2914+
{
2915+
"key": "SING_SINGLETON_IMPLEMENTS_SERIALIZABLE",
2916+
"name": "Correctness - Class using singleton design pattern directly or indirectly implements Serializable interface.",
2917+
"type": "BUG",
2918+
"severity": "MAJOR",
2919+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sing-singleton-implements-serializable"
2920+
},
2921+
{
2922+
"key": "SING_SINGLETON_INDIRECTLY_IMPLEMENTS_CLONEABLE",
2923+
"name": "Correctness - Class using singleton design pattern indirectly implements Cloneable interface.",
2924+
"type": "BUG",
2925+
"severity": "MAJOR",
2926+
"url": "https://spotbugs.readthedocs.io/en/latest/bugDescriptions.html#sing-singleton-indirectly-implements-cloneable"
2927+
},
28792928
{
28802929
"key": "SIO_SUPERFLUOUS_INSTANCEOF",
28812930
"name": "Correctness - Unnecessary type check done using instanceof operator",

0 commit comments

Comments
 (0)