Understanding the OWASP Security Dashboards and Reports

Select Reports > Portal > Repository > Standard Content > OWASP.

We provide dashboards and reports based on the industry-wide standards set by the Open Web Application Security Project®. OWASP is a nonprofit foundation that works to improve the security of software. The organization has established a list of the Top 10 security risks to web applications, focusing on the most critical threats to the shared, on-demand nature of webbased applications.

Reporting includes the following dashboards and reports, organized according to OWASP’s Top 10 risk categories:

Category Dashboards Reports
Broken Access Control n/a Broken Access Control
Broken Authentication n/a Broken Authentication
Cross-site Scripting Cross Site Scripting XSS Vulnerabilities
Injections Injection Vulnerabilities Overview

Command Injections on HTTP Request

Injection Vulnerabilities

SQL Injection

Insecure Deserialization – Dashboards and Reports Deserialization Flaws Overview Deserialization Flaws
Insufficient Logging and Monitoring – Dashboards and Reports

Attacks and Suspicious Activities Overview

Failed Logins Overview

Login Activity Overview

Operating System Errors and Warnings

Security Log is Full

All Logins by Hostname

Failed Logins Summary

Audit Log Cleared

Security Misconfiguration

Misconfiguration Events Overview

Missing Security Patches Overview

Security Patch Missing
Sensitive Data Exposure Information Leaks Overview

Organizational Records Information Leaks

Personal Information Leaks

Using Components with Known Vulnerabilities – Dashboards and Reports

SSH Vulnerabilities Overview

Vulnerability Overview

SSH Vulnerabilities Summary

SSL Vulnerabilities

XML External Entities XML Vulnerabilities Overview XML Vulnerabilities