Acunetix 12.0.1902維護版本更新用於Windows和Linux,包括全新漏洞檢查、更新及修復。

 

全新漏洞檢查
• Drupal REST Remote Code Execution (CVE-2019-6340)
• vBulletin 5 routestring Local File Inclusion Vulnerability
• ThinkPHP v5.0.22/5.1.29 Remote Code Execution Vulnerability
• uWSGI Unauthorized Access Vulnerability
• FastCGI Unauthorized Access Vulnerability
• Typo3 Restler 1.7.0 Local File Disclosure
• A number of new vulnerability checks for WordPress Core and Plugins and Drupal Core

 

更新
• Update Source Code Disclosure checks to prevent False Positives
• Unused paths are now filtered from AcuSensor data

 

修復
• Fixed false positive in Expression Language Injection vulnerability check
• Fixed issue in LSR / Deepscan when processing scripts overriding to JSON on Object

 

Acunetix 12的用戶可以從軟體介面中的「設置頁面」(Settings page)設定新版通知並啟用自動升級。尚未安裝或升級的用戶,可至原廠網頁(https://www.acunetix.com/fullver)下載程式後輸入授權序號(License Key)啟用產品。

 

詳細內容:https://www.acunetix.com/blog/releases/new-build-checks-for-drupal-rce-thinkphp-rce-vbulletin-lfi-and-typo3-restler-lfi/

 

產品網頁:https://www.ahasoft.com.tw/tool/acunetix.html

 

如果您有任何疑問,請與我們聯繫(電話02-2749-1909;信箱Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它)

 

20190307acunetix-news