Compare Products
![]() |
![]() |
Features The vulnerabilities detected by LAPSE+ are related to the injection of untrusted data to manipulate the behavior of the application. This type of vulnerabilities are the most common in web applications. The vulnerability categories detected by LAPSE+ are enumerated below:
* Parameter Tampering.
* URL Tampering.
* Header Manipulation.
* Cookie Poisoning.
* SQL Injection.
* Cross-site Scripting (XSS).
* HTTP Response Splitting.
* Command Injection.
* Path Traversal.
* XPath Injection.
* XML Injection.
* LDAP Injection.
|
Features * Yasca can scan source code written in Java, C/C++, HTML, JavaScript, ASP, ColdFusion, PHP, COBOL, .NET, and other languages. Yasca can integrate easily with other tools, including: FindBugs, PMD, JLint, JavaScript Lint, PHPLint, CppCheck, ClamAV, RATS, Pixy.
* Yasca is designed to be very flexible and easy to extend. In fact, writing a new rule is as easy as coming up with a regular expression, the file extensions it applies to, and the name of your new rule. Place that information in a text file in the plugin directory, and run Yasca!
|
LanguagesJava |
LanguagesC CPP Java VB.NET Java Script Other |
Source TypeOpen
|
Source TypeOpen
|
License TypeGPL GPLv3 |
License TypeGPL |
OS Type |
OS Type |
Pricing
|
Pricing
|
X
Compare Products
Select up to three two products to compare by clicking on the compare icon () of each product.
{{compareToolModel.Error}}Now comparing:
{{product.ProductName | createSubstring:25}} X