RIPS Code Analysis

GPTKB entity

Statements (83)
Predicate Object
gptkbp:instanceOf gptkb:software
static code analysis tool
gptkbp:analyzes PHP code
gptkbp:detects gptkb:Cross-site_request_forgery_(CSRF)
gptkb:Cross-site_scripting_(XSS)
gptkb:Information_disclosure
SQL injection
Insecure deserialization
Command injection
Denial of Service (DoS)
Authentication issues
Code execution vulnerabilities
File inclusion vulnerabilities
File manipulation vulnerabilities
Improper access control
Improper error handling
Improper file permissions
Improper input validation
Improper logging
Improper output encoding
Improper resource management
Improper session expiration
Improper use of APIs
Improper use of configuration files
Improper use of cryptography
Improper use of environment variables
Improper use of file FIFOs
Improper use of file appending
Improper use of file attributes
Improper use of file buffers
Improper use of file copying
Improper use of file deletion
Improper use of file descriptors
Improper use of file devices
Improper use of file downloads
Improper use of file extensions
Improper use of file handles
Improper use of file hardlinks
Improper use of file links
Improper use of file locking
Improper use of file metadata
Improper use of file modes
Improper use of file moving
Improper use of file names
Improper use of file offsets
Improper use of file ownership
Improper use of file paths
Improper use of file permissions
Improper use of file pipes
Improper use of file pointers
Improper use of file positions
Improper use of file reading
Improper use of file renaming
Improper use of file sizes
Improper use of file sockets
Improper use of file storage
Improper use of file streams
Improper use of file symlinks
Improper use of file timestamps
Improper use of file types
Improper use of file unlocking
Improper use of file uploads
Improper use of file writing
Improper use of third-party libraries
Insecure cryptography
Path traversal
Session management issues
Unvalidated redirects
Weak password hashing
gptkbp:developedBy RIPS Technologies
gptkbp:firstReleased 2010
gptkbp:focusesOn security vulnerabilities
https://www.w3.org/2000/01/rdf-schema#label RIPS Code Analysis
gptkbp:usedBy developers
enterprises
software companies
security professionals
penetration testers
code auditors
gptkbp:usedFor automated security analysis
gptkbp:website https://www.ripstech.com/
gptkbp:bfsParent gptkb:SARIF
gptkbp:bfsLayer 7