i want the answer not answering my own questions . you filthy
what a vulnerability of web based application
If the application is succeptible to internet attacks
ActiveX controls can modify the properties of objects in an application.
Nessus
Active X controls can modify the properties of objects in an application. AGNugent
Risk assessments evaluate the sensitivity and critical of the system or application data to the vulnerabilities, threats, impacts, and potential countermeasures that may exist in its environment.
Could be strategic planning process, or maybe vulnerability assessment. Wait no, it's Six Sigma I think . . . not sure are you?
Vulnerability
A vulnerability scan is the automated process of proactively identifying vulnerabilities of software and computing systems in a network to determine if and where a system or network can be exploited and/or threatened. Vulnerability scanning usually employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to improve the network's overall security posture. The primary goal of a vulnerability scan is to reduce the vulnerability of a software application, a database, a computer, or a network of computers to hacking, denial of service, infection, and other security risks.
Vulnerability testing identifies available vulnerabilities and is usually used to only manage list of available vulnerabilities. Penetration testing includes phase of Vulnerability testing but goes beyond. The tester actively tries to exploit identified vulnerabilities to gain access to the system. Penetration testing identifies the true risk level of tested system and application.
His vulnerability, as far as I know, is immortal women.
vulnerability