Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This covers design errors that lead to unintentional vulnerabilities.

XXXXX

 

Encryption and randomness

...

Rules belonging to this vulnerability type check for injection weaknesses in the source code.

Misconfiguration

 

XXXXXX

 This covers common parameters not properly configured (for example, in web.xml file in J2EE apps or web.config in .NET, etc)  that lead to unintentional vulnerabilities.

Number handling

Number handling issues include incorrect calculations as well as number storage and conversions. An example is an integer overflow. On a 32-bit system, a signed integer’s maximum value is 2,147,483,647. If this value is increased by one, its new value will be a negative number rather than the expected 2,147,483,648 due to the limitation of the number of bits used to store the number.

...