Forum Discussion
1 Reply
Sort By
- Erik_NovakEmployee
Can you import that WebInspect scan output XML file into an ASM policy? And review the vulnerabilities? It's very likely that ASM can resolve that type of violation most likely with attack signatures.