Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/31/2009
04:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Klocwork Releases Standalone Java Source Code Analysis Solution

Klocwork Solo includes the ability to understand code developed for the Android platform

BURLINGTON, Mass. -- March 30, 2009 -- Klocwork, Inc., the proven leader in automated source code analysis solutions for improving software security and quality, today announced the availability of Klocwork Solo. This new product from Klocwork delivers proven, enterprise-ready, static analysis technology to the individual Java developer. Klocwork Solo is a downloadable Java static source code analysis (SCA) product that automatically identifies critical bugs and security vulnerabilities in Java source code quickly and accurately. Additionally, Klocwork's newest product ships with a built-in ability to understand code being developed for the Android platform.

Klocwork Solo introduces an easy-to-use solution that's fully integrated with the Eclipse IDE, providing fast, accurate source code analysis with low false positive results. The product also provides the following capabilities:

  • Automated detection of more than 200 different security vulnerabilities and quality defects without the need to run or generate test cases;
  • Ability to identify issues specific to Android mobile device development, including a range of issues that can cause runtime failures, such as null object references, resource leaks and usage of already freed resources;
  • Persistent analysis results which allow for tracking of issues over time, thus maximizing productivity.

    "The market for mobile applications is exploding, driving up the demand for more effective developer productivity tools that enable developers to write better code," said Mike Laginski, CEO, Klocwork. "Klocwork Solo was designed to address the specific needs of the individual Java developer. Now developers can access our enterprise-grade Java SCA capabilities via an easy to use, downloadable tool."

    Klocwork Solo is available on a subscription basis at $299US per user, per year, with a limited time offer of $99US per user, per year until June 30, 2009. A 30-day free trial of Klocwork Solo for Java is available for download today from Klocwork's website at www.klocwork.com/solo.

    About Klocwork Klocwork is an enterprise software company providing automated source code analysis software products that enhance the productivity and agility of C, C++, C#, and Java software developers. More than 500 customers have integrated Klocwork's automated source code analysis tools into their software development process in order to ensure their code is free of mission-critical flaws while freeing their developers to focus on what they do best " innovate.

    Contact Klocwork for more information at www.klocwork.com or [email protected]

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    News
    Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
    Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
    Edge-DRsplash-10-edge-articles
    Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
    Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
    News
    Cybercrime Groups More Prolific, Focus on Healthcare in 2020
    Robert Lemos, Contributing Writer,  2/22/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Building the SOC of the Future
    Building the SOC of the Future
    Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-22861
    PUBLISHED: 2021-03-03
    An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted ...
    CVE-2021-22862
    PUBLISHED: 2021-03-03
    An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of ...
    CVE-2021-22863
    PUBLISHED: 2021-03-03
    An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would b...
    CVE-2020-10519
    PUBLISHED: 2021-03-03
    A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the Gi...
    CVE-2021-21353
    PUBLISHED: 2021-03-03
    Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was p...