Statements (83)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:software
static code analysis tool |
gptkbp:analyzes |
PHP code
|
gptkbp:detects |
gptkb:Cross-site_request_forgery_(CSRF)
gptkb:Cross-site_scripting_(XSS) gptkb:Information_disclosure SQL injection Insecure deserialization Command injection Denial of Service (DoS) Authentication issues Code execution vulnerabilities File inclusion vulnerabilities File manipulation vulnerabilities Improper access control Improper error handling Improper file permissions Improper input validation Improper logging Improper output encoding Improper resource management Improper session expiration Improper use of APIs Improper use of configuration files Improper use of cryptography Improper use of environment variables Improper use of file FIFOs Improper use of file appending Improper use of file attributes Improper use of file buffers Improper use of file copying Improper use of file deletion Improper use of file descriptors Improper use of file devices Improper use of file downloads Improper use of file extensions Improper use of file handles Improper use of file hardlinks Improper use of file links Improper use of file locking Improper use of file metadata Improper use of file modes Improper use of file moving Improper use of file names Improper use of file offsets Improper use of file ownership Improper use of file paths Improper use of file permissions Improper use of file pipes Improper use of file pointers Improper use of file positions Improper use of file reading Improper use of file renaming Improper use of file sizes Improper use of file sockets Improper use of file storage Improper use of file streams Improper use of file symlinks Improper use of file timestamps Improper use of file types Improper use of file unlocking Improper use of file uploads Improper use of file writing Improper use of third-party libraries Insecure cryptography Path traversal Session management issues Unvalidated redirects Weak password hashing |
gptkbp:developedBy |
RIPS Technologies
|
gptkbp:firstReleased |
2010
|
gptkbp:focusesOn |
security vulnerabilities
|
https://www.w3.org/2000/01/rdf-schema#label |
RIPS Code Analysis
|
gptkbp:usedBy |
developers
enterprises software companies security professionals penetration testers code auditors |
gptkbp:usedFor |
automated security analysis
|
gptkbp:website |
https://www.ripstech.com/
|
gptkbp:bfsParent |
gptkb:SARIF
|
gptkbp:bfsLayer |
7
|