摘要 |
<p>Method for detecting security vulnerabilities in a web application, which includes analyzing client request (30) and server responses (40). The client request (30) are mutated to generate exploits of an application, and the attacks are evaluated.</p> |