1) the exact place
in the source code that causes the problem;
2) the type of this vulnerability;
3) the exact method and code for exploitation;
4) the modifications on the software so as to be resistant to
The application has been already choosen. It is limesurvey .
We used tools such as Rips, OWASP Zap and W3af and found vulnerabilities such as cross site scripting and SQL injection but not able to mitigate them.