- International Standard ISO 27001 report
This report displays existing web application vulnerabilities that violate this standard control objectives. The control objectives as listed in this standard are directly derived from and aligned with the control objectives listed in ISO 17799.
- International Standard ISO 27002 report
This report displays existing web application vulnerabilities that violate this standard control objectives. The control objectives as listed in this standard are directly derived from and aligned with the control objectives listed in ISO 17799.
- NERC Cyber Security Standards report
This report displays NERC Cyber Security Standards issues found on your site. Many web application vulnerabilities might lead to security breaches of personal information, directly or indirectly, and might be considered as violations of the regulation.
- NIST Special Publication 800-53 Revision 5 report
This report displays National Institute of Standards and Technology (NIST) issues found on your application. Many web application vulnerabilities might lead to security breaches of personal information, directly or indirectly, and might be considered violation of the regulation.
- OWASP Top 10 report 2021
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to your web applications.
- OWASP API Security Top 10 report 2019
APIs, or application program interfaces, are vital tools for businesses in all industries. Since there is a rise in use of APIs in many domains and APIs are a critical part of modern mobile, SaaS and web applications, it is inevitable to release the importance of API security and its unique vulnerabilities as compared to web applications. OWASP API Security Top 10 report help developers, testers, and users — as well as project managers, security researchers, and educators — provide insight into the most severe and current security weaknesses related to APIs.
- OWASP API Security Top 10 report 2023
APIs, or application program interfaces, are vital tools for businesses in all industries. Since there is a rise in use of APIs in many domains and APIs are a critical part of modern mobile, SaaS and web applications, it is inevitable to release the importance of API security and its unique vulnerabilities as compared to web applications. OWASP API Security Top 10 report help developers, testers, and users — as well as project managers, security researchers, and educators — provide insight into the most severe and current security weaknesses related to APIs.
- OWASP Cloud-Native Application Security Top 10 report
The OWASP Cloud-Native Application Security Top 10 is a resource that identifies the most critical security risks associated with cloud-native applications. It also details the challenges organizations face when securing these applications and provides guidance on mitigating those risks.
- OWASP Application Security Verification Standard Report
The Application Security Verification Standard (ASVS) is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, tool vendors, and consumers to define, build, test, and verify secure applications.
- CWE Top 25 Most Dangerous Software Weaknesses 2023 report
This report displays Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses found on your site. The CWE Top 25 is a valuable community resource that can help developers, testers, and users — as well as project managers, security researchers, and educators — provide insight into the most severe and current security weaknesses.
- WASC Threat Classification v2.0 report
This report displays WASC threat classification issues found on your site.