top of page
WEB APP VULNERABILITY ASSESSMENT
Action  | First Steps Web Assessment  | Web Application Vulnerbility Assessment  | 
|---|---|---|
Report length  | 1-2 pages  | Extensive  | 
Report Detail  | Overview  | Highly detailed with an Exec Summary  | 
Broken Authentication  | X  | |
Software and data integrity failure  | X  | |
Security logging and monitoring failure  | X  | |
Server side request forgery  | X  | |
XML External Entities  | X  | |
Security Misconfiguration  | X  | |
Cross site scripting  | X  | |
SQL injection  | X  | |
Insecure Design  | X  | |
Broken Access Control  | X  | |
Vulnerable and Outdated components  | X  | X  | 
Sensitive Data Exposure  | X  | X  | 
Automated Vulnerability scan  | X  | X  | 
Reconnaissance / Enumeration  | X  | X  | 
bottom of page
