Automated Detection of Host Header Attacks

Automated scanning for certain classes of vulnerabilities is now possible with AcuMonitor, a service available for Acunetix Web Vulnerability Scanner version 9. One of these new classes of vulnerabilities is Host Header attacks. To display the contents of a website, the browser first resolves the website domain (www.test.com) to an IP address, connects to this […]

Read More →

Acunetix Web Vulnerability Scanner Announces Full HTML5 Support

As new technologies bring new security risks to light, Acunetix steps up to the challenge with the most comprehensive crawling and scanning technology in the market yet. MALTA, 15 August 2013 — Acunetix today announced the 9th release of its award-winning Web Vulnerability Scanner, building on the experience and knowledge of several years of working with organisations across the […]

Read More →

Email Header Injection Web Vulnerability

What is Email Header Injection? Email Header Injection is a web security vulnerability exploited by spammers to send email anonymously. It occurs in web applications that do not properly sanitize user input when preparing and sending email messages. Email Header Injection vulnerabilities are commonly found in websites implementing a “Contact Us” form which legitimate users […]

Read More →

XML External Entity (XXE) Vulnerabilities

The XML standard defines a concept of an external general parsed entity (also shortened to external entity) that can access local or remote content via a declared system identifier. During XML parsing, the XML processor will replace such entities with the content referenced by them. For example, here is an XML that contains an external […]

Read More →

FAQ: How Can I Backup My Acunetix WVS Settings?

After installing Acunetix WVS configuring it to best suit your requirements (scanning profiles, save directories, login sequences etc.), you might need to make changes to your workstation that might cause all these customizations to be lost – e.g. formatting your hard drive. It is highly recommended to backup your Acunetix settings and customizations to easily […]

Read More →

Application Security Calls For A Proactive Approach

Error! That’s something we don’t have much room for in application security. Yet we leave so much to chance. The only reasonable way to find the flaws that matter – and to keep up – is to use automated tools and processes wherever possible. Numerous information security studies show that application security is seriously lagging […]

Read More →