Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0 |
GreenC bot (talk | contribs) Rescued 1 archive link. Wayback Medic 2.5 |
||
Line 9:
DAST tools facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, such as input/output validation: (e.g. [[cross-site scripting]] and [[SQL injection]]), specific application problems and server configuration mistakes.
In a copyrighted report published in March 2012 by security vendor Cenzic, the most common application vulnerabilities in recently tested applications include:<ref>{{cite web|url=https://info.cenzic.com/Trend-Report-Application-Security.html|archive-url=https://archive.today/20121217132011/https://info.cenzic.com/Trend-Report-Application-Security.html|url-status=dead|archive-date=17 December 2012|title=2012 Trends Report: Application Security Risks|publisher=Cenzic, Inc.|date=11 March 2012|accessdate=9 July 2012
{| class="wikitable" style="text-align: left;"
|