New Features and Vulnerability Tests
- Added detection for Apache Struts Remote Code Execution (s2-052)
- Added detection for Apache Struts Remote Code Execution (s2-053) – CVE-2017-12611
- Check for Header Injection via misconfigured nginx redirects
- Check for nginx Integer Overflow vulnerability (CVE-2017-7529)
- Improved the detection of Blind SQL Injection
- JAVA error detection now includes the full JAVA error returned by the server
- Improved the Remote File Inclusion XSS checks
- Updated the Joomla and WordPress vulnerability checks
- Fixed bug causing the downloading of a Target’s LSR file to fail
- Fixed bug in HTTP Digest Authentication
Upgrade to the latest build
If you are already using Acunetix v11, you can initiate the automatic upgrade from the new build notification in the Acunetix UI .
If you have not yet installed or upgraded to Acunetix v11, you may download Acunetix version 11 from here. Use your current Acunetix License Key to download and activate the product.