Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?
Network enumerator
Computer worm
Port scanner
Web application security scanner
Submit