Supported Sast rules
The rules for Code Vulnerabilities listed below are classified by language according to their kind.
Csharp
Go
Injection
Java
Javascript
Injection
-
Improper neutralization of data within XPath expressions ('XPath Injection')
-
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
-
Improper neutralization of input during web page generation ('Cross-site Scripting' aka 'XSS')
-
Improper neutralization of XML entities ('Xml Entity Injection')
Php
Injection
-
Improper neutralization of external input used within a CSV or Excel formula ('Formula Injection')
-
Improper neutralization of data within XPath expressions ('XPath Injection')
-
Improper neutralization of input during web page generation ('Cross-site Scripting' aka 'XSS')
-
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
-
Improper neutralization of XML entities ('Xml Entity Injection')