top of page
WEB APP VULNERABILITY ASSESSMENT
Action | First Steps Web Assessment | Web Application Vulnerbility Assessment |
---|---|---|
Report length | 1-2 pages | Extensive |
Report Detail | Overview | Highly detailed with an Exec Summary |
Broken Authentication | X | |
Software and data integrity failure | X | |
Security logging and monitoring failure | X | |
Server side request forgery | X | |
XML External Entities | X | |
Security Misconfiguration | X | |
Cross site scripting | X | |
SQL injection | X | |
Insecure Design | X | |
Broken Access Control | X | |
Vulnerable and Outdated components | X | X |
Sensitive Data Exposure | X | X |
Automated Vulnerability scan | X | X |
Reconnaissance / Enumeration | X | X |
bottom of page