Why Are Some Vulnerabilities Marked as Verified?

Starting from Acunetix Version 12 (build 12.0.190325161), Acunetix marks some vulnerabilities identified during a scan as verified. Verified vulnerabilities are vulnerabilities that Acunetix has detected with 100% certainty in the web application being scanned and thus they do not need to be manually verified. Acunetix can verify vulnerabilities with or without AcuSensor, although AcuSensor does […]

Read More →

Migrating Acunetix On-Premise to Another Server

This article explains the steps that you should take to migrate Acunetix On-Premise to another server while keeping the configuration and reports intact. This process applies to Microsoft Windows installations. Before you start the migration process, make sure to back up your Acunetix installation. You can find more information about how to backup Acunetix configuration […]

Read More →

Step by Step Configuration of Acunetix with Jenkins

Acunetix offers out-of-the-box integration with Jenkins CI. The setup procedure requires the Acunetix API key, which is available for Enterprise editions. Before proceeding any further, ensure that you have installed the latest version of Acunetix. You can download it from https://www.acunetix.com/fullverĀ  Note that these instructions are for a Windows installation but you can easily modify […]

Read More →

How to Configure Acunetix with Kenna Security

You can integrate Acunetix with Kenna Security as a connector, out of the box. The following configuration applies to both the Kenna VM appliance and the SaaS solution. First, create a new Kenna instance. On the Home page, you can see statistics for imported vulnerability assets together with risk management data. To integrate Acunetix with […]

Read More →

How to Schedule Future and Recurrent Scans

With Acunetix, it is not only possible to start a scan instantaneously, but you can schedule a scan for a future date and time, or schedule recurrent scans which might be helpful for periodical reporting. These can be set up as follows: After adding the target and configuring the scan settings, click on Scan. Once […]

Read More →