Welcome to computermalaysia.com.my - Your genuine software online store!

Help & Settings

My Account Contact Us

ThunderScan® SAST

Out of stock

Share with friends
More Information
Additional Information
SKU thunderscan-sast
Status Enabled
Description

ThunderScan® SAST

STATIC APPLICATION SECURITY TESTING SOLUTION

Attacks on applications present the greatest threat to the security of organizations. The best way to ensure that your applications are free from critical vulnerabilities is to perform a comprehensive audit of application source code using ThunderScan.

ThunderScan® Application Security

ThunderScan®

SOURCE CODE SECURITY ANALYSIS (SAST)

DefenseCode ThunderScan® is a SAST (Static Application Security Testing, WhiteBox Testing) solution for performing deep and extensive security analysis of application source code. ThunderScan® is easy to use, requires almost no user input and can be deployed during or after development with easy integration into your DevOps environment and CI/CD pipeline. Our SAST solution provides an excellent way to automate code inspection as an alternative to the demanding and time-consuming procedure of manual code reviews.

Find out why large enterprises are replacing their current SAST solutions with DefenseCode ThunderScan® SAST.

With DefenseCode ThunderScan® SAST it is possible to scan millions of source code lines across 29 different programming languages and various programming frameworks within hours or even minutes. Scalability combined with repeatability of automation provides an easy and painless way to introduce security into your DevOps for organizations ranging from small development teams up to the largest enterprises.

ThunderScan® includes a Dependency Check component (Software Composition Analysis – SCA) that will detect publicly disclosed vulnerabilities contained within a project’s dependencies with associated CVE entries.

Application source code security analysis has proven consistently to be the  most comprehensive way to ensure that your application is free of security vulnerabilities (SQL Injections, Cross Site Scripting, Path/Directory Traversal, Code Injection, and many more.).

With ThunderScan® SAST it is very easy to meet the compliance standards requirements such as PCI-DSS, SANS/CWE Top 25, OWASP Top 10, HIPPA, HITRUST or NIST.

ThunderScan® SAST easy to use and very powerful REST API  allows you to customize source code scanning and scale across large number of scanning agents.

DefenseCode ThunderScan® has repeatedly recognized its effectiveness by discovering critical vulnerabilities in well known open source applications.

ThunderScan® performs fast and accurate analysis of large and complex source code projects delivering precise results and low false positive rate.

Vulnerabilities

ThunderScan® scans for more than 70 different vulnerability types (including OWASP Top 10, SANS 25 and CWE) in desktop, web and mobile applications developed on various platforms using different development environments and frameworks. ThunderScan® includes a Dependency Check component (Software Composition Analysis - SCA) that will detect publicly disclosed vulnerabilities contained within a project’s dependencies with associated CVE entries.

HIGH

  • SQL Injection
  • Command Injection
  • Code Injection
  • XPath Injection
  • LDAP Injection
  • XML External Entity (XXE) Injection
  • Path/Directory Traversal
  • Deserialization of Untrusted Data
  • Server Pages Execution
  • Server Side Request Forgery
  • PHP File Inclusion
  • Buffer Overflow
  • Integer Overflow
  • Arbitrary Library Injection
  • Use After Free
  • Double Free
  • Time of Check Time of Use
  • Uncontrolled Format String
  • Out of Buffer Bounds Read
  • Out of Buffer Bounds Write
  • Insecure Data Storage
  • Insufficient Transport Layer Protection
  • Shared Preferences Usage
  • Man-in-the-Middle Attack

MEDIUM

  • File Manipulation
  • Cross-Site Scripting
  • DOM Based Cross-Site Scripting
  • HTTP Header Injection
  • HTTP Response Splitting
  • Unvalidated/Open Redirect
  • Regex Denial of Service (ReDoS)
  • Sleep Denial Of Service
  • System Properties Change
  • Session Fixation
  • Session Poisoning
  • Integer Underflow
  • Uncontrolled Memory Allocation
  • Intents Usage
  • Arbitrary Code Injection
  • Application Configuration
  • Trust Boundary Violation
  • Location Information

LOW

  • Hardcoded Password/Credentials
  • Secret Key In Source
  • Heap Inspection
  • Error Messages Information Exposure
  • Log Forging