New Acunetix release ¡¦ packed with exciting feature (¿µ¹®)
 
 
2014/05/07 (11:11)
ÀÛ¼ºÀÚ : °ü¸®ÀÚ Á¶È¸¼ö : 2413
 
Acunetix Web Vulnerability Scanner New Version Released
New features include: Manipulation of JSON/XML inputs, Google Web Toolkit™ support and new .NET4.5 AcuSensor 

We are delighted to inform you that our product team have just finalized the latest release of Acunetix Web Vulnerability Scanner version 9.5. This new version includes very important updates, such as using CVE, CWE and CVSS to classify vulnerabilities detected during a scan, support for scanning web applications using Google Web Toolkit and a major update to AcuSensor to support .NET 4.5 web applications. 

Here’s an overview of the major updates:

Vulnerability alerts include classification from the internationally adopted CVE, CWE and CVSS 
The alerts for vulnerabilities detected during a web application scan have been updated to include the classification provided by CVE, CWE and CVSS. This allows you to better assess the severity and risk of a vulnerability, making it easier to prioritize your remediation efforts. Read more.

Detect vulnerabilities in Google Web Toolkit implementations 
This benefits developers that are implementing web applications using GWT. Acunetix now fully supports web applications implemented in Google Web Toolkit, exposing all types of vulnerabilities in such web applications, including SQL Injection and Cross-Site Scripting. Read more. 

AcuSensor technology updated to support .NET 4.5
ASP .NET developers will be glad to know that our proprietary AcuSensor Technology has been updated to better support applications implemented in the latest version of .NET. 

Traditional black box scanners do not know how an application reacts, and source code analyzers do not understand how the application will behave while under attack. AcuSensor Technology combines both techniques to provide Integrated Application Security Testing (IAST) and achieve significantly better results. Read more.

Test Host Headers, JSON and XML inputs
The Acunetix scanner has also been updated to run checks on the Host Header in the HTTP request, as well as on JSON and XML inputs. JSON and XML inputs are also tested when these values are located in the cookies exchanged with the web application. Read more.

How do I upgrade to the latest version of Acunetix?
Your customers can download the latest version of Acunetix Web Vulnerability Scanner directly from here. Their license key will be needed to initiate the download.

This upgrade requires a valid Maintenance Agreement. Click here to review list prices for Version Upgrades. Partners may purchase new licenses and version upgrades online from our Acunetix Partner Portal. Please revert by email if you have any difficulties in gaining access to the Partner Portal. Remember to take this opportunity to get your customers back onto the Maintenance track if their Maintenance Agreement is long expired or was never purchased.

Acunetix Online Vulnerability Scanner (OVS) subscribers will automatically receive the updates introduced in this version.
Like Us on Facebook     Follow Us on Twitter    Follow Us on LinkedIn 
 

We send regular, important and critical updates to people who have downloaded or registered for a free trial version of Acunetix Vulnerability Scanner and to our business partners and customers.
Acunetix Ltd
Unit 2, St Johns Mews, 13 St Johns Road,
Hampton Wick, Kingston Upon Thames, Greater London, KT1 4AN


 

 
 
 
 
  ÀÌÀü ¡ã : amCharts - Introducing Live Chart Editor (¿µ¹®)
  ´ÙÀ½ ¡å : UEStudio 14.20 released, new UltraCompare and UltraFinder on the way... (¿µ¹®)