A penetration tester has performed a vulnerability scan of a specific host that contains a valuable database and has identified the following vulnerabilities:
✑ XSS
✑ HTTP DELETE method allowed
✑ SQL injection
✑ Vulnerable to CSRF
To which of the following should the tester give the HIGHEST priority?
miabe
2 years, 10 months agolikeahoss
3 years, 6 months agosmalltech
3 years, 9 months agoCapCrunch
3 years, 10 months agoanonamphibian
3 years, 2 months agononyabiz
3 years, 10 months agoTheThreatGuy
4 years, 4 months agovaro82
3 years, 11 months agoufovictim
4 years, 3 months agosomeguy1393
4 years, 5 months agojossephh
4 years, 5 months agoanonamphibian
3 years, 2 months agoVaios
4 years, 7 months agoGreyHunter
4 years, 7 months ago