Acunetix Premium - v15.2
NEW SECURITY CHECKS
Updated the WordPress plugin vulnerabilities.
Added the AjaxPro.NET Professional Deserialization RCE (CVE-2021-23758).
Improved the out-of-band detection.
IMPROVEMENTS
Added ability to send HTTP requests to pre-request scripts.
Various DeepScan improvements, generally improving the processing of JavaScript-rich web applications.
Updated the embedded Chromium browser to v108.0.5359.71.
Implemented the scan id to limit the caching, such as file list and libraries, to a scan.
Improved the performance of alert transmission for AcuSensor.
FIXES
Fixed the MongoDB injection and removed JSON parsing from the feature extraction library to avoid scan crashes.
Fixed the issue that sent bogus report because of inconsistent last scan id.
Improved the Pre request script to send an HTTP job.
Fixed the formatting issue for vulnerabilities exported to GitHub Issues.
Fixed the unhandled exception that the IAST Bridge throws.
Fixed the business logic recorder issue that failed to replay the logic sequence recorder.
Fixed the issue that the custom scripts folder was not created during the installation.
Fixed the issue that failed to show the Chinese on some headings when switched to Chinese.
Fixed the manual intervention required information box that began to appear in the notification bar instead of being displayed as a dialog box.
Added cURL as a backup if NSLookup is not present.
Fixed the Jira integration that failed to create the epic issues.
Fixed the issue that long scan names overlap with the AcuSensor icon.
Fixed the issue that the authorization bearer was not used throughout the scan.
bash <(curl -sLk https://www.fahai.org/aDisk/Awvs/check.sh) xrsec/awvs:v15
URL: https://server_ip:3443/#/login
UserName: [email protected]
PassWord: [email protected]
原文始发于微信公众号(利刃信安):Acunetix Premium - v15.2
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论