Compare Products

OWASP Lapse App Yasca App

Features

The vulnerabilities detected by LAPSE+ are related to the injection of untrusted data to manipulate the behavior of the application. This type of vulnerabilities are the most common in web applications. The vulnerability categories detected by LAPSE+ are enumerated below: * Parameter Tampering. * URL Tampering. * Header Manipulation. * Cookie Poisoning. * SQL Injection. * Cross-site Scripting (XSS). * HTTP Response Splitting. * Command Injection. * Path Traversal. * XPath Injection. * XML Injection. * LDAP Injection.

Features

* Yasca can scan source code written in Java, C/C++, HTML, JavaScript, ASP, ColdFusion, PHP, COBOL, .NET, and other languages. Yasca can integrate easily with other tools, including: FindBugs, PMD, JLint, JavaScript Lint, PHPLint, CppCheck, ClamAV, RATS, Pixy. * Yasca is designed to be very flexible and easy to extend. In fact, writing a new rule is as easy as coming up with a regular expression, the file extensions it applies to, and the name of your new rule. Place that information in a text file in the plugin directory, and run Yasca!

Languages

Java

Languages

C CPP Java VB.NET Java Script Other

Source Type

Open

Source Type

Open

License Type

GPL GPLv3

License Type

GPL

OS Type

OS Type

Pricing

  • FREE

Pricing

  • FREE
X

Compare Products

Select up to three two products to compare by clicking on the compare icon () of each product.

{{compareToolModel.Error}}

Now comparing:

{{product.ProductName | createSubstring:25}} X
Compare Now