What’s New in Acunetix v13

Check out what’s new in Acunetix v13. This brief presentation highlights the following features: Full integration with a network scanner for comprehensive vulnerability management Malware scanning using Windows Defender or ClamAV The revolutionary SmartScan engine – find up to 80% vulnerabilities in the first 20%…

Read more

What Are HTML Injections

HTML injections (HyperText Markup Language injections) are vulnerabilities that are very similar to Cross-site Scripting (XSS). The delivery mechanisms are exactly the same but the injected content is pure HTML tags, not a script like in the case of XSS. HTML injections are less dangerous…

Read more

XSS Filter Evasion Basics

The two primary methods of avoiding Cross-site Scripting (XSS) vulnerabilities are XSS filtering and XSS escaping. However, XSS filtering is not recommended because it can usually be evaded using clever tricks. Here are some of the methods that an attacker can employ in their malicious…

Read more

How to Use Allowed Hosts

When you build web applications, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests. To scan the entire web application, the web vulnerability scanner…

Read more

What Is Cookie Poisoning

The term cookie poisoning is used in different contexts to describe attacks that aim to manipulate, intercept, or forge the content of HTTP cookies. Cookie poisoning attacks are different types of attacks that can affect both the client-side application, data transmission, or the web server….

Read more