What Are JSON Injections

The term JSON injection may be used to describe two primary types of security issues: Server-side JSON injection happens when data from an untrusted source is not sanitized by the server and written directly to a JSON stream. Client-side JSON injection happens when data from…

Read more

What is GHDB (Google Hacking Database)?

The term Google hacking refers to an attack that uses a search engine like Google to find vulnerable web servers and websites. Google hacking is based on inventing specific search queries, often using advanced search operators (such as intitle, inurl, intext, filetype, and more), to locate badly configured…

Read more

New update includes a new scanning algorithm, support for Spring Framework and new vulnerability checks for Ruby on Rails, Jira, Apache Tapestry, Golang, vBulletin, and others

Acunetix version 12 (build 12.0.191121158) has been released. This new build introduces a new scanning algorithm that removes redundant scanning tasks. In addition, the scanning tasks are prioritized in a way that gives dissimilar locations higher scanning priority, improving the time to detect dissimilar vulnerabilities….

Read more