product vulnerability assessment

  • Home
  • |
  • Product Vulnerability Assessment
  • Home
  • |
  • Product Vulnerability Assessment

product vulnerability assessment

Treating application & third party software as a black box

Our product vulnerability assessments are underpinned by our security vulnerability framework. The framework utilises a variety of open source and commercial tools that are integrated into your build pipeline, providing real-time detection and code level remediation advice relating to the following vulnerabilities:

  • Arbitrary forward
  • Authorisation missing
  • Blind SQL injection
  • Command injection
  • File download injection
  • HTTP header injection
  • Insecure direct object reference
  • Path traversal
  • Reflected XSS
  • Session ID disclosure
  • SQL injection
  • Stored XSS
  • Unchecked redirect
  • Unprotected APIs
  • Weak encryption algorithm
  • Weak hash algorithm

Depending on the technologies under inspection, our framework will also provide:

  • An application inventory analysis
  • Third party code analysis
  • Application topology
  • Data route coverage

 

Get in touch via cyber.security@sqa-consulting.com for more information.

 
around-laptop

cyber security TESTIMONIALS

On demand security vulnerability detection & code level remediation advice

Cyber Security SERVICES

cyber protection
cyber risk
management
cyber defence
planning
PRODUCT VULNERABILITY ASSESSMENT

LATEST

CYBER SECURITY NEWS

For those of you who haven’t followed our series on ransomware, previously we discussed how you could use OneDrive to backup and version control
Read more...
In our last two articles on Ransomware we discussed what it was, the impact it can have on your business and some quick steps
Read more...
Are users ready? One of the most common infection vectors is via the end-user and phishing/vishing campaigns are getting more sophisticated every year.  You
Read more...

Get In Touch

Technology Consulting Partners