- Home /
- ThunderScan® SAST
ThunderScan® SAST
Out of stock
SKU | thunderscan-sast |
---|---|
Status | Enabled |
ThunderScan® SAST
STATIC APPLICATION SECURITY TESTING SOLUTION
Attacks on applications present the greatest threat to the security of organizations. The best way to ensure that your applications are free from critical vulnerabilities is to perform a comprehensive audit of application source code using ThunderScan.
ThunderScan® Application Security
ThunderScan®
SOURCE CODE SECURITY ANALYSIS (SAST)
DefenseCode ThunderScan® is a SAST (Static Application Security Testing, WhiteBox Testing) solution for performing deep and extensive security analysis of application source code. ThunderScan® is easy to use, requires almost no user input and can be deployed during or after development with easy integration into your DevOps environment and CI/CD pipeline. Our SAST solution provides an excellent way to automate code inspection as an alternative to the demanding and time-consuming procedure of manual code reviews.
Find out why large enterprises are replacing their current SAST solutions with DefenseCode ThunderScan® SAST.
With DefenseCode ThunderScan® SAST it is possible to scan millions of source code lines across 29 different programming languages and various programming frameworks within hours or even minutes. Scalability combined with repeatability of automation provides an easy and painless way to introduce security into your DevOps for organizations ranging from small development teams up to the largest enterprises.
ThunderScan® includes a Dependency Check component (Software Composition Analysis – SCA) that will detect publicly disclosed vulnerabilities contained within a project’s dependencies with associated CVE entries.
Application source code security analysis has proven consistently to be the most comprehensive way to ensure that your application is free of security vulnerabilities (SQL Injections, Cross Site Scripting, Path/Directory Traversal, Code Injection, and many more.).
With ThunderScan® SAST it is very easy to meet the compliance standards requirements such as PCI-DSS, SANS/CWE Top 25, OWASP Top 10, HIPPA, HITRUST or NIST.
ThunderScan® SAST easy to use and very powerful REST API allows you to customize source code scanning and scale across large number of scanning agents.
DefenseCode ThunderScan® has repeatedly recognized its effectiveness by discovering critical vulnerabilities in well known open source applications.
ThunderScan® performs fast and accurate analysis of large and complex source code projects delivering precise results and low false positive rate.
Vulnerabilities
ThunderScan® scans for more than 70 different vulnerability types (including OWASP Top 10, SANS 25 and CWE) in desktop, web and mobile applications developed on various platforms using different development environments and frameworks. ThunderScan® includes a Dependency Check component (Software Composition Analysis - SCA) that will detect publicly disclosed vulnerabilities contained within a project’s dependencies with associated CVE entries.
HIGH
- SQL Injection
- Command Injection
- Code Injection
- XPath Injection
- LDAP Injection
- XML External Entity (XXE) Injection
- Path/Directory Traversal
- Deserialization of Untrusted Data
- Server Pages Execution
- Server Side Request Forgery
- PHP File Inclusion
- Buffer Overflow
- Integer Overflow
- Arbitrary Library Injection
- Use After Free
- Double Free
- Time of Check Time of Use
- Uncontrolled Format String
- Out of Buffer Bounds Read
- Out of Buffer Bounds Write
- Insecure Data Storage
- Insufficient Transport Layer Protection
- Shared Preferences Usage
- Man-in-the-Middle Attack
MEDIUM
- File Manipulation
- Cross-Site Scripting
- DOM Based Cross-Site Scripting
- HTTP Header Injection
- HTTP Response Splitting
- Unvalidated/Open Redirect
- Regex Denial of Service (ReDoS)
- Sleep Denial Of Service
- System Properties Change
- Session Fixation
- Session Poisoning
- Integer Underflow
- Uncontrolled Memory Allocation
- Intents Usage
- Arbitrary Code Injection
- Application Configuration
- Trust Boundary Violation
- Location Information
LOW
- Hardcoded Password/Credentials
- Secret Key In Source
- Heap Inspection
- Error Messages Information Exposure
- Log Forging