Forum Discussion
Erik_Novak
Jun 10, 2016Employee
Can you import that WebInspect scan output XML file into an ASM policy? And review the vulnerabilities? It's very likely that ASM can resolve that type of violation most likely with attack signatures.