2. Improve C/C++ technology supportOur analysis engine now has support for the Tainting Propagation Algorithm and the Local Symbol Table, giving us better support for the detection of vulnerabilities. We have also added 23 new rules and improved many of the existing ones for both C and C++: - Weak symmetric encryption algorithm (CWE:327, OWASP-M:2014:M4, SANS25:2011:19, OWASP:2017:A3, SANS25:2010:24, PCI-DSS:6.5.3, OWASP:2013:A6, WASC:04)
- Weak cryptographic hash (CWE:327, OWASP:2017:A3, WASC:50, PCI-DSS:6.5.3)
- Avoid unintended access to filesystem resources outside the chroot directory (CWE:243)
- Unsafe chroot call (CWE:243, CERT-D:POS05)
- Static database connection/session (CWE:567, PCI-DSS:6.5.6)
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (OWASP:2017:A1, WASC:19, CWE:89, OWASP:2013:A1, SANS25:2010:2, SANS25:2011:1, PCI-DSS:6.5.1, CWETOP25:2019:6)
- Improper control of resource identifiers ("Resource Injection")(CWE:99, OWASP:2017:A5, OWASP-M:2014:M8, WASC:20, PCI-DSS:6.5.1)
- Do not load executables or libraries from untrusted sources (CWE:114, CWE:494, OWASP:2013:A4, WASC:20, SANS25:2010:20, SANS25:2011:14, PCI-DSS:6.5.8)
- Avoid non-neutralized user-controlled input composed in a pathname to a resource (CWE:22, CWE:73, OWASP:2017:A5, OWASP:2013:A4, CERT-C:FIO01, WASC:33, PCI-DSS:6.5.8, CWETOP25:2019:10)
- Improper neutralization of special elements in data query logic (NoSQL injection) (CWE:943, OWASP:2017:A1, WASC:19, OWASP-M:2014:M7, SANS25:2011:1, PCI-DSS:6.5.1)
- Avoid non-neutralized user-controlled input in LDAP search filters (CWE:90, OWASP:2017:A1, WASC:29, PCI-DSS:6.5.1)
- Weak cryptography, insufficient key length (CWE:326, OWASP:2017:A3, OWASP-M:2014:M6, PCI-DSS:6.5.3)
- Insecure SSL configuration (CWE:296, CWE:297, CWE:298, CWE:299, OWASP-M:2014:M3, OWASP:2013:A6, WASC:04, PCI-DSS:6.5.4)
- Standard pseudo-random number generators cannot withstand cryptographic attacks (CWE:330, CWE:338, CERT-C:MSC30, OWASP:2017:A3, OWASP-M:2014:M6, PCI-DSS:6.5.3)
- Use of Hard-coded Credentials (CWE:798, OWASP:2017:A5, OWASP-M:2014:M2, SANS25:2011:7, WASC:01, PCI-DSS:6.5.3, CWETOP25:2019:19)
- Use of hardcoded salt (CWE:760, OWASP:2013:A6, PCI-DSS:6.5.3)
- Hardcoded cryptographic keys (CWE:321, OWASP:2017:A3, OWASP-M:2014:M6, PCI-DSS:6.3.1, WASC:13)
- Prevent denial of service attack through malicious regular expression ('Regex Injection')(CWE:400,CWETOP25:2019:20)
- Connection string polluted with untrusted input (CWE:99, OWASP:2013:A1, WASC:20, PCI-DSS:6.5.1)
- Access Control - Anonymous LDAP Bind (CWE:285, OWASP:2017:A5, SANS25:2010:5, PCI-DSS:6.5.8)
- Do not use deprecated or obsolete functions (CERT-C:MSC24)
- Do not hardcode absolute paths (CWE:426,CWETOP25:2019:22)
- XML entity injection (CWE:611, CWE:776, OWASP:2017:A4, WASC:43, WASC:44, PCI-DSS:6.5.1, CWETOP25:2019:17)
|