Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:14 PM
Dark Reading
Dark Reading
Products and Releases

Acunetix Upgrades Web Application Security Scanner

Acunetix WVS 6.5 performs file upload forms vulnerability checks'; also features new Login Sequence Recorder and Session Auto Recognition functionality

London 20th May 2009 - Acunetix (www.acunetix.com), a pioneer in web application security scanning technology, has announced new 'file upload forms vulnerability checks' in version 6.5, an industry first and only Web Vulnerability Scanner to scan web applications for this type of vulnerabilities. Robert Abela, Technical Manager at Acunetix said: "Modern and dynamic web applications allow users to upload images, videos, avatars and other types of files, which could lead to a number of new security issues. The more functionality provided to the end users, the more web developers are automatically opening new security holes which malicious users take advantage of. The new version of Acunetix WVS is specifically designed to help in securing modern web applications."

Other key features available with the latest version of Acunetix Web Vulnerability Scanner are the new Login Sequence Recorder, Session Auto Recognition functionality and improved cookie and session handling.

With the new Login Sequence Recorder and Session Auto Recognition module, Acunetix WVS can automatically login to a wider range of authentication forms using different authentication mechanisms, while with the improved cookie and session handling; Acunetix WVS is now able to scan a broader range of dynamic web applications effectively.

With this new set of features, Acunetix Web Vulnerability Scanner adapts easily and makes scanning of modern web applications an easy task, thus saving enterprises valuable time and money. It also helps in preventing hacker attacks; like the ones launched earlier this year against the Kaspersky support website and Twitter website. "Hackers are taking advantage of the broad functionality modern web applications provide to the end user. They can bypass file upload forms security checks to upload harmful files, which later can be used to compromise a web server or a legitimate user's computer. Acunetix Web Vulnerability Scanner helps web masters and developers check for vulnerabilities before web applications are available to the public, or before a malicious user finds them," added Abela.

Acunetix Web Vulnerability Scanner ensures website and web application security by automatically checking for SQL Injection, Cross site scripting and other vulnerabilities. It also scans for AJAX and other Web 2.0 technologies for vulnerabilities, analyses against Google Hacking Database (GHDB), and gives you detailed reports that enable business to meet legal and regulatory compliances. Acunetix WVS also features other advanced tools that permit fine tuning and help manual security audits of web applications security checks.

Acunetix Web Vulnerability Scanner is available in four editions: a Free edition, a Small Business edition, an Enterprise edition for businesses operating more than 1 website, and a Consultant edition.

The Free edition of Acunetix Web Vulnerability scanner can be downloaded from: http://www.acunetix.com/cross-site-scripting/scanner.htm

About Acunetix

Acunetix was founded to combat the alarming rise in web attacks. Its flagship product, Acunetix Web Vulnerability Scanner, is the result of several years of work by a team of highly experienced security developers. Acunetix is a privately held European company. For more information please visit:www.acunetix.com

Useful Links

File upload forms vulnerabilities whitepaper: http://www.acunetix.com/websitesecurity/file-upload-vulns.htm Acunetix Web Security Blog: http://www.acunetix.com/blog

Press Contact

Robert Abela [email protected] Tel.: +356 23168000

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.
PUBLISHED: 2019-11-18
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which m...
PUBLISHED: 2019-11-18
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.