CxSAST is fully capable of identifying vulnerabilities and loopholes that are officially documented or enforced by OWASP Top-10, SANS 25, PCI DSS, HIPAA, MISRA, Mitre CWE, FISMA and BSIMM. With the help of our unique open query language, you can easily create your own security policy consisting of the vulnerabilities most important to your organization.
Detection Throughout The Spectrum
Sample Of Covered Software Vulnerabilities (OWASP Top 10 & more)
HIGH RISK
CGI Reflected XSS
CGI Stored XSS
Code Injection
Command Injection
Connection String Injection
LDAP Injection
Process Control
Reflected XSS
Reflected XSS All Clients
Resource Injection
SOQL SOSL Injection
SQL injection
Second Order SQL Injection
Stored XSS
UTF7 XSS
XPath Injection
MEDIUM THREAT
Access Control
Buffer Overflow
CGI Reflected XSS All Clients
CGI Stored XSS
CGI XSS
Cookies Scoping
Cross Site History Manipulation
DB Paramater Tampering
Dangerous Functions
Data Filter Injection
DoS by Sleep
Double Free
Environment Injection
Environment Manipulation
Files Manipulation
Frame Spoofing
LOW VISIBILITY
Arithmetic Operation On Boolean
Blind SQL Injections
Client Side Only Validation
Cookie not Sent Over SSL
Dangerous File Upload
Dead Code
Deprecated And Obsolete
Deprecated CRT Functions VS2005
DoS by Unreleased Resources
Equals without GetHashCode
Escape False Warning
Files Canonicalization Problems
Hardcoded Absolute Path
Hardcoded Password
Password in Connection String
Impersonation Issue
This website uses cookies to ensure you get the best experience on our website. By continuing on our website,
you consent to our use of cookies. To find out more about how we use cookies, please see our Cookie Policy.