An automated Web security analysis system and process identifies security vulnerabilities
in a target Internet Web site by parsing through the target Web site to search
for a predetermined list of common security vulnerabilities. The process is recursive,
exploiting information gathered throughout the process to search for additional
security vulnerabilities. A prioritized list of detected security vulnerabilities
is then presented to a user, including preferably a list of recommendations to
eliminate the detected security vulnerabilities.