An Automated Web Vulnerability Scanner for Detecting Common Security Flaws in Modern Web Applications – Volume 12 Issue 5

International Journal of Computer Techniques Logo
International Journal of Computer Techniques
ISSN 2394-2231
Volume 12, Issue 5  |  Published: September – October 2025
Author
Dhvani Dumaniya , Yagnesh N. Makawana , Niraj Dineshkumar Bhagchandani

Abstract

Due to the high number of sectors utilizing web applications today such as, banking, healthcare, e-commerce and so on, security is the most prominent issue concerning the web applications. Traditional vulnerability testing techniques, such as manual penetration testing, may become time-consuming and expensive; they may also have a very high tolerance that renders them incapable of scaling to the size and complexity of a contemporary web application. A web vulnerability scanner created by us in this paper can prevent these deficiencies. Scanner based on the principles of crawling a web site, traversing links and form fields, submitting forms and reading responses, gathering all input vector by, and then determining all potential XSS -injection points. The trick that the tool applies is to execute attack payloads on target applications and to test their responses to attack the most prevalent web application security vulnerabilities. When a scan is completed, it creates a report in the form of JSON and enumerates the severity, description and location of the vulnerabilities identified. This automated method eliminates most of the manual testing and gives the developers relevant feedback of what they can do to enhance the security of web applications. The scanner is tiny and needs no extra computer hardware thus a great tool to developers, small businesses and schools. Experimentally, the scanner was determined to be capable of effectively identifying the vulnerable states and a practical tool in enhancing web security by experimenting with home-made vulnerable sites. The work is to be seen as a more convenient and efficient solution instead of the traditional security testing technology besides it aids in the fill-up of the hue in the vital security defects of web applications.

Keywords

Web Vulnerability Scanner, SQL, Cross-Site Scripting (XSS) and Automated Security Testing and Vulnerability Detection.

Conclusion

This research has developed an automatic web vulnerability scanner for the solving of heightened concern over web application security. The software is mainly focused on finding wide-spread vulnerabilities but also includes many other security checks as well such as SQL Injection (SQLi), Cross-Site Scripting (XXS), Configuration errors and more. The risk-based approach ensures that every identified issue is beaten on its own terms by focussing on the most relevant threats for web applications. The scanner proved to be very effective in case of the quick and accurate identification of the vulnerabilities through the rigorous test in controlled settings. The scanner was found to be more reliable and quicker compared to the traditional manual testing option, and the bonus was that it was less likely to be affected by human error. The tool is designed in modules, and this enables it to be scaled to accommodate a broad scope of web applications, between small websites and more complex ones. The fact that the scanner can produce detailed and structured reports in the form of the JSON format gives the developers actionable data of where the vulnerabilities it identifies are, allowing them to respond immediately, ensuring that their applications become more secure. Although in some cases there were false positives especially when minor misconfigurations were made, the overall performance was impressive ensuring that the tool is useful to developers and security professionals. Moving forward, the scanner indicates that additional developments could be made to the scanner, such as machine learning to detect vulnerabilities more intelligently and cloud compatibility to perform continuous monitoring of the current development environment. This will not only enhance the detection capabilities of the tool but also widen applicability of the tool to newer web technologies and dynamic environments. To sum up, the study provides a powerful, convenient, and affordable web vulnerability scanning tool, which has the potential to become a key component in the current endeavor to secure web-based applications against the more advanced cyber threat.

References

[1]Mohaidat, A. I., & Al-Helali, A. (2024). Web vulnerability scanning tools: A comprehensive overview, selection guidance, and cyber security recommendations. International Journal of Research Studies in Computer Science and Engineering, 10(1), 8–15. [2]Bazzoli, E., Criscione, C., Maggi, F., & Zanero, S. (2014). XSS Peeker: A systematic analysis of cross-site scripting vulnerability scanners. Politecnico di Milano. arXiv:1410.4207. [3]Rajan, A., & Erturk, E. (2017). Web vulnerability scanners: A case study. Eastern Institute of Technology. arXiv:1706.08017. [4]Shamunesh, P., Vinoth, S., & Srinivas, L. N. B. (2023). Cybercheck – OSINT & web vulnerability scanner. In Proceedings of the Second International Conference on Edge Computing and Applications (ICECAA 2023). [5]Al Anhar, A., & Suryanto, Y. (2021). Evaluation of web application vulnerability scanner for modern web application. In 2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST). [6]Ibrahim, R. Y., & Rosli, M. M. (2023). Evaluation of web application vulnerability scanners using SQL injection attacks. In 2023 8th IEEE International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE). [7]Sandberg, M., & Gunnarsson, E. (2024). Web vulnerability scanner: Cybersecurity (Bachelor’s thesis). KTH Royal Institute of Technology. [8]Sarpong, P. A., Larbi, L. S., Korsah, D. P., Abdulai, I. B., Amankwah, R., & Amponsah, A. (2021). Performance evaluation of open source web application vulnerability scanners based on OWASP benchmark. International Journal of Computer Applications, 174(18), 15–22. [9]Yudin, O., Kharchenko, V., & Pevnev, V. (2023). Scanning of web-applications: Algorithms and software for search of vulnerabilities “code injection” and “insecure design.” In Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). [10]Chen, X., & Zhang, Y. (2024). Evaluation of automated vulnerability scanning tools for modern web applications. International Journal of Cybersecurity and Application, 29(3), 45–58. [11]Lee, S., & Kim, J. (2022). A comparative study of web vulnerability scanners for identifying XSS and SQL Injection. Journal of Information Security, 18(2), 115–130. [12]Sharma, R., & Gupta, A. (2023). Enhancing vulnerability scanning with machine learning integration. Computers & Security, 98, 102–114. [13]Chen, X., & Zhang, Y. (2024). Evaluation of automated vulnerability scanning tools for modern web applications. International Journal of Cybersecurity and Application, 29(3), 45–58. [14]Lee, S., & Kim, J. (2022). A comparative study of web vulnerability scanners for identifying XSS and SQL Injection. Journal of Information Security, 18(2), 115–130. [15]Sharma, R., & Gupta, A. (2023). Enhancing vulnerability scanning with machine learning integration. Computers & Security, 98, 102–114.

IJCT Important Links

© 2025 International Journal of Computer Techniques (IJCT).