A security engineer is trying to identify instances of a vulnerability in an internally developed line of business software. The software is hosted at the company's internal data center. Although a standard vulnerability definition does not exist, the identification and remediation results should be tracked in the company's vulnerability management system. Which of the following should the engineer use to identify this vulnerability?
Steel16
3 months, 3 weeks ago891216f
5 months agoBright07
6 months, 2 weeks agoKokoh23
6 months, 2 weeks ago231354b
6 months, 3 weeks agogrelaman
8 months, 4 weeks agoBright07
9 months agoHereToStudy
9 months, 1 week ago