20190027 Khorev Pavel B., Zheltov Maxim I. Assessing Information Risks When Using Web Applications Using Fuzzy Logic. Q: Can the vulnerability scanner presented in the work be used not only in the learning process? A: Work has now been suspended as my co-author has completed his master's degree. But in the future, the development of the work is expected. Q: How the vulnerability scanner prototype was tested? A: Vulnerability scanner testing was done both manually and with unit tests written using the JUnit 5 library.