Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Jump to navigation
Jump to search
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 164: | Line 164: | ||
# http://wush.net/trac/wikka/ticket/293 | # http://wush.net/trac/wikka/ticket/293 | ||
# http://core.trac.wordpress.org/ticket/2041 | # http://core.trac.wordpress.org/ticket/2041 | ||
# CWE-20, CWE-79, CWE-89, CWE-77, CWE-22, CWE-74, CWE-226, CWE-138, CWE-212, CWE-150 | |||