Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 164: Line 164:
# http://wush.net/trac/wikka/ticket/293
# http://wush.net/trac/wikka/ticket/293
# http://core.trac.wordpress.org/ticket/2041
# http://core.trac.wordpress.org/ticket/2041
# CWE-20, CWE-79, CWE-89, CWE-77, CWE-22, CWE-74, CWE-226, CWE-138, CWE-212, CWE-150