<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Oberon</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Oberon"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Oberon"/>
		<updated>2026-05-06T10:09:39Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9264</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9264"/>
				<updated>2006-08-25T22:27:02Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''LAPSE: Web Application Security Scanner for Java'''&lt;br /&gt;
== News ==&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released (see http://suif.stanford.edu/~livshits/work/lapse/download.html)&lt;br /&gt;
* 8/22//2006 - OWASP LAPSE Project Created&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a &amp;lt;u&amp;gt;L&amp;lt;/u&amp;gt;ightweight &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;nalysis for &amp;lt;u&amp;gt;P&amp;lt;/u&amp;gt;rogram &amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ecurity in &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;clipse. LAPSE is designed to help with the task of auditing &amp;lt;b&amp;gt;Java J2EE&amp;lt;/b&amp;gt; applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action (click to see a bigger image)]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [http://suif.stanford.edu/~livshits/ Benjamin Livshits]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9258</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9258"/>
				<updated>2006-08-24T21:56:20Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released (see http://suif.stanford.edu/~livshits/work/lapse/download.html)&lt;br /&gt;
* 8/22//2006 - OWASP LAPSE Project Created&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a &amp;lt;u&amp;gt;L&amp;lt;/u&amp;gt;ightweight &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;nalysis for &amp;lt;u&amp;gt;P&amp;lt;/u&amp;gt;rogram &amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ecurity in &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;clipse. LAPSE is designed to help with the task of auditing &amp;lt;b&amp;gt;Java J2EE&amp;lt;/b&amp;gt; applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action (click to see a bigger image)]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [http://suif.stanford.edu/~livshits/ Benjamin Livshits]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9257</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9257"/>
				<updated>2006-08-24T21:55:59Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released (see http://suif.stanford.edu/~livshits/work/lapse/download.html)&lt;br /&gt;
* 8/22//2006 - OWASP LAPSE Project Created&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a &amp;lt;u&amp;gt;L&amp;lt;/u&amp;gt;ightweight &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;nalysis for &amp;lt;u&amp;gt;P&amp;lt;/u&amp;gt;rogram &amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ecurity in &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;clipse. LAPSE is designed to help with the task of auditing &amp;lt;b&amp;gt;Java J2EE&amp;lt;/b&amp;gt; applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action (click to see a bigger image)]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
[http://suif.stanford.edu/~livshits/ Benjamin Livshits]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9254</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9254"/>
				<updated>2006-08-24T21:46:16Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released (see http://suif.stanford.edu/~livshits/work/lapse/download.html)&lt;br /&gt;
* 8/22//2006 - OWASP LAPSE Project Created&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a &amp;lt;u&amp;gt;L&amp;lt;/u&amp;gt;ightweight &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;nalysis for &amp;lt;u&amp;gt;P&amp;lt;/u&amp;gt;rogram &amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ecurity in &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;clipse. LAPSE is designed to help with the task of auditing &amp;lt;b&amp;gt;Java J2EE&amp;lt;/b&amp;gt; applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action (click to see a bigger image)]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9253</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9253"/>
				<updated>2006-08-24T21:45:33Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released&lt;br /&gt;
* 8/22//2006 - OWASP LAPSE Project Created&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a &amp;lt;u&amp;gt;L&amp;lt;/u&amp;gt;ightweight &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;nalysis for &amp;lt;u&amp;gt;P&amp;lt;/u&amp;gt;rogram &amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ecurity in &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;clipse. LAPSE is designed to help with the task of auditing &amp;lt;b&amp;gt;Java J2EE&amp;lt;/b&amp;gt; applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action (click to see a bigger image)]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9252</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9252"/>
				<updated>2006-08-24T21:45:02Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released&lt;br /&gt;
* 8/22//2006 - OWASP LAPSE Project Created&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a &amp;lt;u&amp;gt;L&amp;lt;/u&amp;gt;ightweight &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;nalysis for &amp;lt;u&amp;gt;P&amp;lt;/u&amp;gt;rogram &amp;lt;u&amp;gt;S&amp;lt;/u&amp;gt;ecurity in &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;clipse. LAPSE is designed to help with the task of auditing &amp;lt;b&amp;gt;Java J2EE&amp;lt;/b&amp;gt; applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9251</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9251"/>
				<updated>2006-08-24T21:43:24Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/2//2006 - OWASP LAPSE Project Created&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with the task of auditing Java J2EE applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
[[Image:screenshot.jpg|thumb|300px|right|LAPSE in action]]&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Screenshot.jpg&amp;diff=9250</id>
		<title>File:Screenshot.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Screenshot.jpg&amp;diff=9250"/>
				<updated>2006-08-24T21:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9249</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9249"/>
				<updated>2006-08-24T21:35:19Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== News ==&lt;br /&gt;
* 8/2//2006 - OWASP LAPSE Project Created&lt;br /&gt;
* 8/23/2006 - version 2.5.5 released&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with the task of auditing Java J2EE applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
* Identify taint sources&lt;br /&gt;
* Identify taint sinks&lt;br /&gt;
* Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9248</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9248"/>
				<updated>2006-08-24T21:28:59Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
&lt;br /&gt;
LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with the task of auditing Java J2EE applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project].&lt;br /&gt;
&lt;br /&gt;
LAPSE targets the following Web application vulnerabilities:&lt;br /&gt;
&lt;br /&gt;
    * Parameter manipulation        * SQL injections&lt;br /&gt;
    * Header manipulation           * Cross-site scripting&lt;br /&gt;
    * Cookie poisoning              * HTTP splitting&lt;br /&gt;
    * Command-line parameters       * Path traversal  &lt;br /&gt;
&lt;br /&gt;
What should you do to avoid these vulnerabilities in your code? How do we protect Web applications from exploits? The proper way to deal with these types of attacks is by sanitizing the tainted input. Please refer to the OWASP guide to find out more about Web application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in auditing a Java Web application, LAPSE helps you in the following ways:&lt;br /&gt;
&lt;br /&gt;
    * Identify taint sources&lt;br /&gt;
    * Identify taint sinks&lt;br /&gt;
    * Find paths between sources and sinks &lt;br /&gt;
&lt;br /&gt;
LAPSE is inspired by existing lightweight security auditing tools such as [http://www.securesw.com/rats RATS], [http://www.striker.ottawa.on.ca/~aland/pscan/ pscan], and [http://www.dwheeler.com/flawfinder/ FlawFinder]. Unlike those tools, however, LAPSE addresses vulnerabilities in Web applications. LAPSE is not intended as a comprehensive solution for Web application security, but rather as an aid in the code review process. Those looking for more comprehensive tools are encouraged to look at some of the tools produced by Fortify or Secure Software.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP LAPSE Project Created! - 09:37, 22 August 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is proud to announce the creation of the OWASP LAPSE project!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9247</id>
		<title>Category:OWASP LAPSE Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_LAPSE_Project&amp;diff=9247"/>
				<updated>2006-08-24T21:21:15Z</updated>
		
		<summary type="html">&lt;p&gt;Oberon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
&lt;br /&gt;
With the general consensus about building security into the SDLC, there's a high demand for source code auditing tools that can be used directly by developers.  And while the commercial space has some good offerings, there isn't really anything that's open source and free - until now.&lt;br /&gt;
&lt;br /&gt;
For now, LAPSE is housed at http://suif.stanford.edu/~livshits/work/lapse/&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP LAPSE Project Created! - 09:37, 22 August 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is proud to announce the creation of the OWASP LAPSE project!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Oberon</name></author>	</entry>

	</feed>