...Request XPATH Injection XML Injection Parameter Manipulation Remote File Includes Information Disclosure Malicious Content Upload Evasion Techniques Application DoS LDAP Injection We would need you to generate a report on the errors and suggestions on how to rectify them. Please provide sample of reporting documentation in your application
We need to use SSO within vTiger. The users login credentials should be authenticated via Microsoft Office365 Business. vTiger has a working implementation with LDAP Authentication. This should be extended for using oAuth2 or similar to check users credentials.