Understanding the OWASP Security Dashboards and Reports

In the Reports Portal, select Repository > Standard Content > OWASP.

We provide dashboards and reports based on the industry-wide standards set by the Open Web Application Security Project®. OWASP is a nonprofit foundation that works to improve the security of software. The organization has established a list of the Top 10 security risks to web applications, focusing on the most critical threats to the shared, on-demand nature of webbased applications.

Reporting includes the following dashboards and reports, organized according to OWASP’s Top 10 risk categories:

Category Dashboards Reports
Broken Access Control N/A Broken Access Control
Cryptographic Failure Information Leaks Overview

Organizational Records Information Leaks

Personal Information Leaks

Identification and Authentication Failures N/A Broken Authentication and Session Management
Injections

Injection Vulnerabilities Overview

XSS Vulnerabilities

Command Injections on HTTP Request

Cross Site Scripting

Injection Vulnerabilities

SQL Injection

Software and Data Integrity Failures

Deserialization Flaws Overview

Deserialization Flaws
Security Logging and Monitoring Failures

Attacks and Suspicious Activity Overview

Failed Logins Overview

Login Activty Overview

Security Log is Full

All Logins by Hostname

Audit Log Cleared

Failed Logins Summary

Operating System Errors and Warnings

Security Misconfiguration

Misconfiguration Events Overview

Missing Security Patches Overview

XML Vulnerabilities Overview

Security Patch Missing

XML Vulnerabilities

Server-Side Request Forgery N/A Server-Side Request Forgery
Vulnerable and Outdated Components

SSH Vulnerabilities Overview

Vulnerability Overview

SSH Vulnerabilities Summary

SSL Vulnerabilities