Our vBulletin migration is complete.
Welcome vBulletin users! All content and user information from the Micro Focus Forums (vBulletin) site has been migrated to this site. READ MORE.

Fortify Software Security Content 2018 Update 4

Micro Focus Expert
Micro Focus Expert
1 0 996

Micro Focus_Logo.png




Fortify Software Security Research Release Announcement

Micro Focus Security Research

hoole@microfocus.com | 14 December 2018


Micro Focus Fortify Software Security Content 2018 Update 4

Fortify Software Security Research (SSR) is pleased to announce the immediate availability of updates to Fortify Secure Coding Rulepacks (English language, version 2018.4.0), Fortify WebInspect SecureBase (available via SmartUpdate), Fortify Application Defender, and Fortify Premium Content.

The Micro Focus Fortify Software Security Research team translates cutting-edge research into security intelligence that powers the Micro Focus Security Products Portfolio. Highlights in this Release Announcement include:


Micro Focus Fortify Secure Coding Rulepacks [SCA]

With this release, the Fortify Secure Coding Rulepacks detect 789 unique categories of vulnerabilities across 25 programming languages and span over one million individual APIs. In summary, the release includes the following: 

  • SQLite and iOS improvements
  • Akka HTTP
  • JAX-RS improvements
  • Python six
  • DISA STIG 4.8
  • PCI DSS 3.2.1


Micro Focus Fortify SecureBase [Fortify WebInspect]

Fortify SecureBase combines checks for thousands of vulnerabilities with policies that guide users in the following updates available immediately via SmartUpdate: 

Vulnerability support

  • LDAP Injection
  • Open Redirect
  • Access Control: Authorization Bypass
  • Privacy Violation
  • Dynamic Code Evaluation: Code Injection
  • Websocket Discovered 

Compliance report

  • DISA STIG 4.8
  • PCI DSS 3.2.1 

Policy Updates

  • New policy to include checks relevant to DISA STIG 4.8.
  • New policy for WebSocket related vulnerabilities.


Micro Focus Fortify Premium Content

The research team builds, extends, and maintains a variety of resources outside our core security intelligence products.

DISA STIG 4.8 reports [i]

To accompany the new correlations, this release also contains a new report bundle for Fortify SSC with support for DISA STIG 4.8, which is available for download from the Fortify Customer Support Portal under Premium Content.

PCI DSS 3.2.1 [i]

To accompany the new correlations, this release also contains a new report bundle for Fortify SSC with support for PCI DSS 3.2.1, which is available for download from the Fortify Customer Portal under Premium Content.

Micro Focus Fortify Taxonomy: Software Security Errors

  • The Fortify Taxonomy site, containing descriptions for newly added category support, is available at https://vulncat.fortify.com/.
  • Customers looking for the legacy site, with the last supported update, may obtain it from the Micro Focus Fortify Support Portal.

Details are available in the attached release letter along with specific feature requirements. We hope that you continue to find our products helpful and we welcome any feedback. If you have any questions, please don’t hesitate to contact us.

Contact Software Security Research

Alexander M. Hoole

Manager, Software Security Research

Micro Focus Fortify


+1 (650) 258-5916



Contact Fortify Technical Support

Micro Focus Fortify


+1 (844) 260-7219




[i]. Support for DISA STIG 4.8 and PCI DSS 3.2.1 reports requires Fortify SSC version 18.20 or above.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.