Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 287: Line 287:
|-
|-
| style="background: #eeeeee" | 1.1.6.1
| style="background: #eeeeee" | 1.1.6.1
| 0.50
| 1.00
| 0.10
| 0.15
| 0.14
| 0.13
| 0.10
| 0.07
|-
|-
| style="background: #eeeeee" |  1.1.6.2
| style="background: #eeeeee" |  1.1.6.2
| 0.38
| 1.00
| 0.13
| 0.22
| 0.20
| 0.10
| 0.17
| 0.11
|-
|-
| style="background: #eeeeee" |  1.1.6.3
| style="background: #eeeeee" |  1.1.6.3
| 0.43
| 1.00
| 0.32
| 0.09
| 0.23
| 0.08
| 0.26
| 0.11
|-
|-
| style="background: #eeeeee" |  1.1.6.4
| style="background: #eeeeee" |  1.1.6.4
| 0.28
| 0.08
| 0.21
| 1.00
| 0.11
| 0.00
| 0.17
| 0.00
|-
|-
| style="background: #eeeeee" |  1.1.6.5
| style="background: #eeeeee" |  1.1.6.5
| 0.19
| 0.18
| 0.04
| 0.04
| 0.05
| 0.50
| 0.00
| 0.00
|}
|}