Audit an Application for Common Vulnerabilities