<?xml version="1.0" encoding="UTF-8"?>
<!--Sample XML file generated by XMLSpy v2011 sp1 (http://www.altova.com)-->
<!--NOTE: this data was created by MITRE, using information published on
	the Internet by certain vendors.  It is being used to demonstrate CCR
	and does not represent any official position by those vendors.-->
<CWE_Coverage_Claims xsi:noNamespaceSchemaLocation="CWE_Coverage_Claims_Schema_v0.2.xsd"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
	<CWE_Coverage_Claim CWE_Version="???" Vendor_Name="Klocwork" Toolset_Name="?"
		Toolset_Version="?" Language_Type="Source Code" Language="??" Date_of_Claim="2011-04-01">
		<Claims>
			<Claim CWE_ID="79" CWE_Name="XSS" Match_Accuracy="Exact">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<Rule Rule_ID="SV.XSS.DB" Rule_Name="">
						<Rule_Comments/>
					</Rule>
					<Rule Rule_ID="SV.DATA.DB" Rule_Name="">
						<Rule_Comments/>
					</Rule>
					<Rule Rule_ID="SV.XSS.REF" Rule_Name="">
						<Rule_Comments/>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim CWE_ID="352" CWE_Name="CSRF" Match_Accuracy="Not-Covered">
				<CWE_Claim_Comments>It is very difficult for static analysis to identify any CSRF
					issues, because each application has its own implicit security policy that
					dictates which requests can be influenced by an outsider. </CWE_Claim_Comments>
			</Claim>
			<Claim CWE_ID="798" CWE_Name="Hard-coded Credentials" Match_Accuracy="Exact">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<Rule Rule_ID="SV.PASSWD.HC" Rule_Name="">
						<Rule_Comments/>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim CWE_ID="738" CWE_Name="Insecure Permissions" Match_Accuracy="CWE-more-abstract">
				<CWE_Claim_Comments>Checkers such as SV.FIU.PERMISSIONS do provide some coverage,
					but typically, loose permissions for operations and custom permission models
					produce too many warnings from static analysis tools.</CWE_Claim_Comments>
				<Rule_Set>
					<Rule Rule_ID="SV.FIU.PERMISSIONS" Rule_Name="">
						<Rule_Comments/>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim CWE_ID="98" CWE_Name="PHP Remote File Inclusion" Match_Accuracy="Not-Covered">
				<CWE_Claim_Comments>Associated with PHP code, which is not covered by Klocwork.
				</CWE_Claim_Comments>
			</Claim>
			<Claim CWE_ID="770" CWE_Name="Resource Allocation without Limits/Throttling"
				Match_Accuracy="Not-Covered">
				<CWE_Claim_Comments>Not statically verifiable. Manual inspection is required.
				</CWE_Claim_Comments>
			</Claim>
			<Claim CWE_ID="327" CWE_Name="Broken/Risky Crypto" Match_Accuracy="Other">
				<CWE_Claim_Comments>Use Klocwork extensibility to identify commonly used libraries
					or features that have become obsolete. </CWE_Claim_Comments>
			</Claim>
		</Claims>
		<Comments>Coverage claims ONLY for the 2010 CWE-SANS Top 25. </Comments>
		<Comments> NOTE: this data was created by MITRE, using information published on the Internet
			by certain vendors. It is being used to demonstrate CCR and does not represent any
			official position by those vendors.</Comments>
	</CWE_Coverage_Claim>
	<CWE_Coverage_Claim CWE_Version="??" Vendor_Name="Coverity"
		Toolset_Name="Coverity Static Analysis Checker" Toolset_Version="??"
		Language_Type="Source Code" Language="C/C++" Date_of_Claim="2011-04-01">
		<Claims>
			<Claim CWE_ID="20" CWE_Name="Improper Input Validation"
				Match_Accuracy="CWE-more-abstract">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<Rule Rule_ID="TAINTED_SCALAR" Rule_Name="">
						<Rule_Comments>Use of untrusted scalar value, untrusted value as an
							argument, use of untrusted value</Rule_Comments>
					</Rule>
					<Rule Rule_ID="TAINTED_STRING" Rule_Name="">
						<Rule_Comments>Use of untrusted string value</Rule_Comments>
					</Rule>
					<!-- [Christey] This is probably CWE-822, introduced in CWE 1.11 -->
					<Rule Rule_ID="USER_POINTER" Rule_Name="">
						<Rule_Comments>User pointer dereference</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim CWE_ID="119" CWE_Name="String" Match_Accuracy="CWE-more-abstract">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<Rule Rule_ID="ARRAY_VS_SINGLETON">
						<Rule_Comments>String</Rule_Comments>
					</Rule>
					<Rule Rule_ID="BAD_ALLOC_ARITHMETIC">
						<Rule_Comments>String</Rule_Comments>
					</Rule>
					<!-- [Christey] integer overflow is CWE-190 (the chain of int-overflow to buf-overflow is CWE-680) -->
					<Rule Rule_ID="INTEGER_OVERFLOW">
						<Rule_Comments>String</Rule_Comments>
					</Rule>
					<!-- [Christey] out-of-bounds access is CWE-125 -->
					<Rule Rule_ID="OVERRUN_STATIC">
						<Rule_Comments>Out-of-bounds access, out-of-bounds write</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim CWE_ID="190" CWE_Name="Integer Overflow" Match_Accuracy="Unknown">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<!-- [Christey] not use of INTEGER_OVERFLOW in 119 claim as well. -->
					<Rule Rule_ID="INTEGER_OVERFLOW">
						<Rule_Comments>Integer overflow, integer overflowed argument, overflowed
							constant, overflowed return value</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim CWE_ID="369" CWE_Name="Divide-by-Zero" Match_Accuracy="Exact">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<!-- [Christey] not use of INTEGER_OVERFLOW in 119 claim as well. -->
					<Rule Rule_ID="INTEGER_OVERFLOW">
						<Rule_Comments>Integer overflow, integer overflowed argument, overflowed
							constant, overflowed return value</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim Match_Accuracy="No-CWE-available">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<Rule Rule_ID="ASSERT_SIDE_EFFECT">
						<Rule_Comments>Function in assertion, side effect in
							assertion</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim Match_Accuracy="No-CWE-available">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<!-- [Christey] CWE-835 created in CWE 1.12 -->
					<Rule Rule_ID="INFINITE_LOOP">
						<Rule_Comments>Infinite loop, infinite loop with no exit</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
			<Claim Match_Accuracy="Not-CWE-applicable">
				<CWE_Claim_Comments/>
				<Rule_Set>
					<Rule Rule_ID="PARSE_ERROR">
						<Rule_Comments>Unrecoverable parse warning</Rule_Comments>
					</Rule>
				</Rule_Set>
			</Claim>
		</Claims>
		<Comments>Partial mapping obtained from the Coverity Coverage data sheet.</Comments>
		<Comments> NOTE: this data was created by MITRE, using information published on the Internet
			by certain vendors. It is being used to demonstrate CCR and does not represent any
			official position by those vendors.</Comments>
	</CWE_Coverage_Claim>
</CWE_Coverage_Claims>
