Dynamic application security testing: Difference between revisions

Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0
GreenC bot (talk | contribs)
Rescued 1 archive link. Wayback Medic 2.5
Line 9:
DAST tools facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, such as input/output validation: (e.g. [[cross-site scripting]] and [[SQL injection]]), specific application problems and server configuration mistakes.
 
In a copyrighted report published in March 2012 by security vendor Cenzic, the most common application vulnerabilities in recently tested applications include:<ref>{{cite web|url=https://info.cenzic.com/Trend-Report-Application-Security.html|archive-url=https://archive.today/20121217132011/https://info.cenzic.com/Trend-Report-Application-Security.html|url-status=dead|archive-date=17 December 2012|title=2012 Trends Report: Application Security Risks|publisher=Cenzic, Inc.|date=11 March 2012|accessdate=9 July 2012}}{{Dead link|date=July 2019 |bot=InternetArchiveBot |fix-attempted=yes }}</ref>
 
{| class="wikitable" style="text-align: left;"