88 datasets found
  1. w

    Websites susceptible to CVE-2023-28777

    • webtechsurvey.com
    csv
    Updated Oct 31, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2023). Websites susceptible to CVE-2023-28777 [Dataset]. https://webtechsurvey.com/cve/CVE-2023-28777
    Explore at:
    csvAvailable download formats
    Dataset updated
    Oct 31, 2023
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2023-28777, compiled through global website indexing conducted by WebTechSurvey.

  2. Global web application critical vulnerability taxonomy 2023

    • statista.com
    Updated Jun 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global web application critical vulnerability taxonomy 2023 [Dataset]. https://www.statista.com/statistics/806081/worldwide-application-vulnerability-taxonomy/
    Explore at:
    Dataset updated
    Jun 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    SQL Injection is the main source of web application critical vulnerabilities found globally in 2023, with ** percent, in addition to ** percent of internet facing critical vulnerabilities due to cross site scripting (stored) attacks.

  3. w

    Websites susceptible to CVE-2025-47478

    • webtechsurvey.com
    csv
    Updated May 23, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2025). Websites susceptible to CVE-2025-47478 [Dataset]. https://webtechsurvey.com/cve/CVE-2025-47478
    Explore at:
    csvAvailable download formats
    Dataset updated
    May 23, 2025
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2025-47478, compiled through global website indexing conducted by WebTechSurvey.

  4. w

    Websites susceptible to CVE-2025-32149

    • webtechsurvey.com
    csv
    Updated Apr 4, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2025). Websites susceptible to CVE-2025-32149 [Dataset]. https://webtechsurvey.com/cve/CVE-2025-32149
    Explore at:
    csvAvailable download formats
    Dataset updated
    Apr 4, 2025
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2025-32149, compiled through global website indexing conducted by WebTechSurvey.

  5. W

    Web Application Scanning Solution Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Apr 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Web Application Scanning Solution Report [Dataset]. https://www.datainsightsmarket.com/reports/web-application-scanning-solution-1991763
    Explore at:
    ppt, pdf, docAvailable download formats
    Dataset updated
    Apr 26, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The global Web Application Scanning (WAS) solution market is experiencing robust growth, driven by the increasing frequency and sophistication of cyberattacks targeting web applications. The rising adoption of cloud-based applications and the expanding digital footprint of businesses across all sectors are key factors fueling market expansion. While precise figures for market size and CAGR are not provided, a reasonable estimation based on industry trends suggests a market size exceeding $5 billion in 2025, growing at a compound annual growth rate (CAGR) of approximately 15% through 2033. This growth is propelled by the escalating need for proactive security measures to mitigate vulnerabilities like SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). The market is segmented by application (SMEs and large enterprises), indicating that larger organizations, with more complex IT infrastructures, currently dominate the market share. However, the increasing digitalization of SMEs is projected to drive significant growth in this segment over the forecast period. Further segmentation by scanning type (active and passive, authenticated and unauthenticated) highlights the diverse needs and approaches within the WAS landscape. The preference for specific scanning types depends on factors such as the level of access required, the desired depth of analysis, and regulatory compliance requirements. Several key trends shape the WAS market. The increasing adoption of DevSecOps methodologies is leading to the integration of WAS solutions into the software development lifecycle (SDLC), allowing for earlier detection and remediation of vulnerabilities. Furthermore, the rise of automated vulnerability scanning tools and the increasing demand for solutions offering comprehensive reporting and analytics are significantly influencing market dynamics. Despite this growth, restraints such as the cost of implementation, the complexities associated with integrating WAS tools into existing systems, and the scarcity of skilled cybersecurity professionals present challenges to market penetration. Nonetheless, the overall market outlook remains positive, with a continued increase in demand for robust and scalable WAS solutions across various industries and geographies. Leading vendors like JFrog, Qualys, Acunetix, and others are actively developing and enhancing their offerings to meet the evolving needs of a cybersecurity-conscious world.

  6. W

    Website Vulnerability Scanner Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Apr 24, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). Website Vulnerability Scanner Report [Dataset]. https://www.datainsightsmarket.com/reports/website-vulnerability-scanner-1988441
    Explore at:
    pdf, ppt, docAvailable download formats
    Dataset updated
    Apr 24, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The website vulnerability scanner market is experiencing robust growth, driven by the increasing frequency and sophistication of cyberattacks targeting websites. The expanding digital landscape, coupled with the rising adoption of cloud-based applications and e-commerce, necessitates robust security measures. This has fueled demand for sophisticated vulnerability scanners capable of identifying and mitigating a wide range of threats, from cross-site scripting (XSS) and SQL injection to insecure configurations and outdated software. While on-premises solutions remain relevant for organizations with stringent security policies and data residency requirements, the cloud-based segment is witnessing accelerated growth due to its scalability, cost-effectiveness, and ease of deployment. Large enterprises are leading the adoption, given their extensive online presence and heightened security concerns. However, SMEs are increasingly investing in these solutions, recognizing the potential financial and reputational damage associated with data breaches. The market's growth is further propelled by evolving regulatory compliance mandates and heightened awareness of cybersecurity risks among businesses of all sizes. Competitive forces are driving innovation, with vendors continuously enhancing their offerings with advanced features like automated vulnerability remediation, AI-powered threat intelligence, and integrated reporting capabilities. Despite the significant growth potential, the market faces certain constraints. The high initial investment cost associated with deploying and maintaining comprehensive vulnerability scanning solutions can deter smaller organizations. Moreover, the complexity of configuring and interpreting scan results can pose challenges for businesses lacking dedicated cybersecurity expertise. The ongoing evolution of cyberattack techniques necessitates continuous updates and improvements to vulnerability scanners, requiring significant ongoing investment from both vendors and users. However, the increasing availability of user-friendly tools and managed security services is gradually mitigating this challenge. Geographical variations in cybersecurity awareness and regulatory compliance frameworks also influence market adoption, with North America and Europe currently dominating market share but significant growth anticipated in the Asia-Pacific region driven by burgeoning digitalization efforts. The forecast period (2025-2033) promises continued expansion, propelled by ongoing technological advancements and the persistent need for robust website security in a constantly evolving threat landscape.

  7. f

    Performance comparison of vulnerability mining software.

    • plos.figshare.com
    xls
    Updated Jun 1, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ying-Chiang Cho; Jen-Yi Pan (2023). Performance comparison of vulnerability mining software. [Dataset]. http://doi.org/10.1371/journal.pone.0117180.t004
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jun 1, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Ying-Chiang Cho; Jen-Yi Pan
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Performance comparison of vulnerability mining software.

  8. w

    Websites susceptible to CVE-2025-26898

    • webtechsurvey.com
    csv
    Updated Mar 27, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2025). Websites susceptible to CVE-2025-26898 [Dataset]. https://webtechsurvey.com/cve/CVE-2025-26898
    Explore at:
    csvAvailable download formats
    Dataset updated
    Mar 27, 2025
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2025-26898, compiled through global website indexing conducted by WebTechSurvey.

  9. f

    University e-mail number and injectable URL statistics.

    • plos.figshare.com
    xls
    Updated May 30, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ying-Chiang Cho; Jen-Yi Pan (2023). University e-mail number and injectable URL statistics. [Dataset]. http://doi.org/10.1371/journal.pone.0117180.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    May 30, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Ying-Chiang Cho; Jen-Yi Pan
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    University e-mail number and injectable URL statistics.

  10. D

    DAST Website Vulnerability Scanner for IT and Telecom Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated May 29, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). DAST Website Vulnerability Scanner for IT and Telecom Report [Dataset]. https://www.datainsightsmarket.com/reports/dast-website-vulnerability-scanner-for-it-and-telecom-524828
    Explore at:
    doc, ppt, pdfAvailable download formats
    Dataset updated
    May 29, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Dynamic Application Security Testing (DAST) website vulnerability scanner market for the IT and Telecom sectors is experiencing robust growth, driven by the increasing frequency and severity of cyberattacks targeting web applications. The market, estimated at $2.5 billion in 2025, is projected to maintain a Compound Annual Growth Rate (CAGR) of 15% from 2025 to 2033, reaching approximately $7 billion by 2033. This expansion is fueled by several key factors: the escalating adoption of cloud-based applications, the rise of remote work environments increasing attack surfaces, and stringent regulatory compliance mandates like GDPR and CCPA, necessitating robust security measures. Furthermore, the growing sophistication of cyber threats, including OWASP Top 10 vulnerabilities like SQL injection and cross-site scripting, compels organizations to invest in advanced DAST solutions for proactive vulnerability management. The market's segmentation reveals a diverse landscape of players, with both established vendors and emerging startups offering a range of solutions catering to various organizational needs and budgets. Competition is fierce, leading to innovation in areas such as automated vulnerability scanning, improved reporting and remediation capabilities, and integration with DevOps pipelines. The competitive landscape is characterized by a mix of large enterprise security vendors and specialized DAST providers. Companies like Invicti, Tenable, and Qualys dominate the market with comprehensive platforms, while smaller companies like PortSwigger and Detectify focus on niche areas or specific methodologies. The geographical distribution shows significant concentration in North America and Europe, reflecting the higher adoption rates of advanced security technologies in these regions. However, the Asia-Pacific region is expected to witness significant growth in the coming years, driven by increasing digitalization and government initiatives to enhance cybersecurity infrastructure. Despite the growth, market restraints include the cost of implementing and maintaining DAST solutions, the need for skilled cybersecurity professionals, and the challenge of integrating DAST into existing security workflows. Overcoming these challenges will be crucial for continued market expansion and wider adoption of DAST among IT and Telecom organizations of all sizes.

  11. w

    Websites susceptible to CVE-2017-17916

    • webtechsurvey.com
    csv
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey, Websites susceptible to CVE-2017-17916 [Dataset]. https://webtechsurvey.com/cve/CVE-2017-17916
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2017-17916, compiled through global website indexing conducted by WebTechSurvey.

  12. Dynamic Application Security Testing Market By Deployment Type (On-Premises,...

    • verifiedmarketresearch.com
    Updated Jul 13, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    VERIFIED MARKET RESEARCH (2024). Dynamic Application Security Testing Market By Deployment Type (On-Premises, Cloud-Based), By Organization Size (Small And Medium-Sized Enterprises (SMEs), Large Enterprises), By Verticals (Banking, Financial Services), & Region For 2024-2031 [Dataset]. https://www.verifiedmarketresearch.com/product/dynamic-application-security-testing-market/
    Explore at:
    Dataset updated
    Jul 13, 2024
    Dataset provided by
    Verified Market Researchhttps://www.verifiedmarketresearch.com/
    Authors
    VERIFIED MARKET RESEARCH
    License

    https://www.verifiedmarketresearch.com/privacy-policy/https://www.verifiedmarketresearch.com/privacy-policy/

    Time period covered
    2024 - 2031
    Area covered
    Global
    Description

    Dynamic Application Security Testing Market was valued at USD 2687.63 Million in 2023 and is projected to reach USD 39.86 Billion by 2031, growing at a CAGR of 24.71% from 2024 to 2031.

    Dynamic Application Security Testing Market: Definition/ Overview

    Dynamic Application Security Testing (DAST) serves as a digital security guard for your online apps. It uses real-world attacker strategies to find flaws in your application's security. Imagine someone attempting to break into your home; DAST performs the same for your program but virtually. DAST tools interact with your running application to analyze its behavior and responses to various inputs. They often look for popular vulnerabilities such as SQL injection (injecting malicious code into database queries) and cross-site scripting (injecting scripts to steal user data). DAST assists in identifying weaknesses before they are exploited by real hackers.

    Dynamic Application Security Testing (DAST) serves as a digital watchdog over your online apps and APIs. It replicates real-world attacks demonstrating how hackers could exploit flaws. DAST identifies vulnerabilities in operating applications that static code analysis techniques may overlook. These can include standard security issues such as SQL injection (database manipulation) and cross-site scripting (malicious code injection).

    Artificial intelligence (AI) will play a larger role in DAST improving accuracy and efficiency. AI may learn from previous weaknesses and attack patterns making it better at recognizing new threats. Additionally, AI can automate processes such as selecting vulnerabilities based on severity allowing security professionals to focus on complicated issues. As APIs become the foundation of modern systems, DAST will evolve to uncover vulnerabilities particular to APIs. This is vital since a hacked API can reveal sensitive information or interrupt critical functions.

  13. w

    Websites susceptible to CVE-2024-43286

    • webtechsurvey.com
    csv
    Updated Aug 19, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2024). Websites susceptible to CVE-2024-43286 [Dataset]. https://webtechsurvey.com/cve/CVE-2024-43286
    Explore at:
    csvAvailable download formats
    Dataset updated
    Aug 19, 2024
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2024-43286, compiled through global website indexing conducted by WebTechSurvey.

  14. w

    Websites susceptible to CVE-2024-40638

    • webtechsurvey.com
    csv
    Updated Nov 15, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2024). Websites susceptible to CVE-2024-40638 [Dataset]. https://webtechsurvey.com/cve/CVE-2024-40638
    Explore at:
    csvAvailable download formats
    Dataset updated
    Nov 15, 2024
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2024-40638, compiled through global website indexing conducted by WebTechSurvey.

  15. w

    Websites susceptible to CVE-2017-5609

    • webtechsurvey.com
    csv
    Updated Jan 29, 2017
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2017). Websites susceptible to CVE-2017-5609 [Dataset]. https://webtechsurvey.com/cve/CVE-2017-5609
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jan 29, 2017
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2017-5609, compiled through global website indexing conducted by WebTechSurvey.

  16. w

    Websites susceptible to CVE-2022-38074

    • webtechsurvey.com
    csv
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey, Websites susceptible to CVE-2022-38074 [Dataset]. https://webtechsurvey.com/cve/CVE-2022-38074
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2022-38074, compiled through global website indexing conducted by WebTechSurvey.

  17. w

    Websites susceptible to CVE-2023-37270

    • webtechsurvey.com
    csv
    Updated Jul 7, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2023). Websites susceptible to CVE-2023-37270 [Dataset]. https://webtechsurvey.com/cve/CVE-2023-37270
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 7, 2023
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2023-37270, compiled through global website indexing conducted by WebTechSurvey.

  18. w

    Websites susceptible to CVE-2024-55986

    • webtechsurvey.com
    csv
    Updated Dec 16, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2024). Websites susceptible to CVE-2024-55986 [Dataset]. https://webtechsurvey.com/cve/CVE-2024-55986
    Explore at:
    csvAvailable download formats
    Dataset updated
    Dec 16, 2024
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2024-55986, compiled through global website indexing conducted by WebTechSurvey.

  19. w

    Websites susceptible to CVE-2024-48040

    • webtechsurvey.com
    csv
    Updated Oct 11, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2024). Websites susceptible to CVE-2024-48040 [Dataset]. https://webtechsurvey.com/cve/CVE-2024-48040
    Explore at:
    csvAvailable download formats
    Dataset updated
    Oct 11, 2024
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2024-48040, compiled through global website indexing conducted by WebTechSurvey.

  20. w

    Websites susceptible to CVE-2025-52832

    • webtechsurvey.com
    csv
    Updated Jul 4, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2025). Websites susceptible to CVE-2025-52832 [Dataset]. https://webtechsurvey.com/cve/CVE-2025-52832
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 4, 2025
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites affected by CVE-2025-52832, compiled through global website indexing conducted by WebTechSurvey.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
WebTechSurvey (2023). Websites susceptible to CVE-2023-28777 [Dataset]. https://webtechsurvey.com/cve/CVE-2023-28777

Websites susceptible to CVE-2023-28777

Explore at:
csvAvailable download formats
Dataset updated
Oct 31, 2023
Dataset authored and provided by
WebTechSurvey
License

https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

Time period covered
2025
Area covered
Global
Description

A complete list of live websites affected by CVE-2023-28777, compiled through global website indexing conducted by WebTechSurvey.

Search
Clear search
Close search
Google apps
Main menu