Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Jump to navigation Jump to search
Line 125: Line 125:
# http://cwe.mitre.org/data/slices/2000.html
# http://cwe.mitre.org/data/slices/2000.html
# http://cwe.mitre.org/data/slices/2000.html
# http://cwe.mitre.org/data/slices/2000.html
# http://trends.builtwith.com/blog
# http://cloc.sourceforge.net/. Version 1.52.