diff -r 321555d0303b -r d1c6608155ef src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py --- a/src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py Tue Jan 16 14:35:46 2024 +0100 +++ b/src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py Tue Jan 16 18:24:06 2024 +0100 @@ -106,12 +106,6 @@ "Use of mark_safe() may expose cross-site scripting vulnerabilities" " and should be reviewed.", ), - "S309": QCoreApplication.translate( - "Security", - "Use of HTTPSConnection on older versions of Python prior to 2.7.9" - " and 3.4.3 do not provide security, see" - " https://wiki.openstack.org/wiki/OSSN/OSSN-0033", - ), "S310": QCoreApplication.translate( "Security", "Audit url open for permitted schemes. Allowing use of file:/ or" @@ -195,11 +189,6 @@ " reverts to the previous behavior that does not validate" " certificates or perform hostname checks.", ), - "S324": QCoreApplication.translate( - "Security", - "Use of os.tempnam() and os.tmpnam() is vulnerable to symlink" - " attacks. Consider using tmpfile() instead.", - ), # hashlib.new "S331": QCoreApplication.translate( "Security", "Use of insecure {0} hash function." @@ -395,6 +384,11 @@ "S611": QCoreApplication.translate( "Security", "Use of 'RawSQL()' opens a potential SQL attack vector." ), + # insecure logging.config.listen() + "S612": QCoreApplication.translate( + "Security", + "Use of insecure logging.config.listen() detected.", + ), # Jinja2 templates "S701.1": QCoreApplication.translate( "Security",