Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions
Programsam (talk | contribs) |
Programsam (talk | contribs) |
||
| Line 287: | Line 287: | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.1 | | style="background: #eeeeee" | 1.1.6.1 | ||
| | | 1.00 | ||
| 0. | | 0.15 | ||
| 0. | | 0.13 | ||
| 0. | | 0.07 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.2 | | style="background: #eeeeee" | 1.1.6.2 | ||
| | | 1.00 | ||
| 0. | | 0.22 | ||
| 0. | | 0.10 | ||
| 0. | | 0.11 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.3 | | style="background: #eeeeee" | 1.1.6.3 | ||
| | | 1.00 | ||
| 0. | | 0.09 | ||
| 0. | | 0.08 | ||
| 0. | | 0.11 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.4 | | style="background: #eeeeee" | 1.1.6.4 | ||
| 0. | | 0.08 | ||
| | | 1.00 | ||
| 0. | | 0.00 | ||
| 0. | | 0.00 | ||
|- | |- | ||
| style="background: #eeeeee" | 1.1.6.5 | | style="background: #eeeeee" | 1.1.6.5 | ||
| 0.04 | | 0.04 | ||
| 0. | | 0.50 | ||
| 0.00 | |||
| 0.00 | |||
|} | |} | ||