Skip to main content
Skip table of contents

C/C++

In this article, we cover C/C++ support and vulnerability detection for Mend SAST.

Note: C/C++ support is currently in beta phase.

Mend SAST-supported C/C++ file types

File Type

.c

.cc

.cpp

.h

Mend SAST-supported C/C++ frameworks

Framework

IBM DB2

Mend SAST-supported C/C++ vulnerability types

The C/C++ vulnerability types detected by SAST are provided below and are organized by CWE ID within each of their identified severities.

C/C++ high-severity vulnerability types

CWE

Vulnerability Type

CWE-22

Path/Directory Traversal

CWE-78

Command Injection

CWE-89

SQL Injection

CWE-121

Buffer Overflow

CWE-134

Uncontrolled Format String

CWE-190

Integer Overflow

CWE-415

Double Free

CWE-416

Use After Free

CWE-787

Out of Buffer Bounds Write

C/C++ medium-severity vulnerability types

CWE

Vulnerability Type

CWE-90

LDAP Injection

CWE-125

Out of Buffer Bounds Read

CWE-191

Integer Underflow

CWE-244

Heap Inspection

CWE-367

Time of Check Time of Use

CWE-676

Miscellaneous Dangerous Functions

C/C++ low-severity vulnerability types

CWE

Vulnerability Type

CWE-114

Arbitrary Library Injection

CWE-242

Use of Inherently Dangerous Function

CWE-369

Divide By Zero

CWE-789

Uncontrolled Memory Allocation

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.