product vulnerability assessment

product vulnerability assessment

Treating application & third party software as a black box

Our product vulnerability assessments are underpinned by our security vulnerability framework. The framework utilises a variety of open source and commercial tools that are integrated into your build pipeline, providing real-time detection and code level remediation advice relating to the following vulnerabilities:

  • Arbitrary forward
  • Authorisation missing
  • Blind SQL injection
  • Command injection
  • File download injection
  • HTTP header injection
  • Insecure direct object reference
  • Path traversal
  • Reflected XSS
  • Session ID disclosure
  • SQL injection
  • Stored XSS
  • Unchecked redirect
  • Unprotected APIs
  • Weak encryption algorithm
  • Weak hash algorithm

Depending on the technologies under inspection, our framework will also provide:

  • An application inventory analysis
  • Third party code analysis
  • Application topology
  • Data route coverage


Get in touch via for more information.


On demand security vulnerability detection & code level remediation advice

cyber security TESTIMONIALS



As the end of 2021 and the start of a new year comes into sight, now is the perfect time to reflect upon how
As organisations learn to adapt to the new normal, more of them are turning to remote working as a long-term solution to their daily
For those of you who haven’t followed our series on ransomware, previously we discussed how you could use OneDrive to backup and version control

Get In Touch

Technology Consulting Partners