The term cookie poisoning is used in different contexts to describe attacks that aim to manipulate, intercept, or forge the content of HTTP cookies. Cookie poisoning attacks are different types of attacks that can affect both the client-side application, data transmission, or the web server….
How and Why to Avoid Unvalidated Redirects and Forwards?
Unvalidated redirects and forwards cannot harm your website or web application but they can harm your reputation by helping attackers lure users to malware sites. If you allow unvalidated redirects and forwards, your website or web application will most probably be used in phishing scams….
Visit Us at RSA Conference 2020
Acunetix will be exhibiting at the RSA Conference 2020 on February 24–28 in San Francisco. Join us at booth #6365 in the North Expo to find out about the latest automated features of Acunetix, the leader in web application security scanning. You can click here…
What Is Integer Overflow
An integer overflow is a type of an arithmetic overflow error when the result of an integer operation does not fit within the allocated memory space. Instead of an error in the program, it usually causes the result to be unexpected. Integer overflows have been…
Top 10 Acunetix Blog Posts in 2019
The year 2019 has been very exciting for Acunetix with many changes and unprecedented growth. Not only did we unveil the long-awaited Acunetix 360 for our enterprise clients but we also moved to bigger offices and our team grew almost two-fold! The Acunetix engine has…
How many users can I configure in Acunetix?
The number of users that you can configure in Acunetix depends on the edition that you have purchased. Acunetix Standard does not allows for only one user – the same user that is created when installing Acunetix. Acunetix Premium (both on-premises and online) allows for…
Season’s Greetings from the Acunetix Team
We would like to wish you the happiest holidays and all the best in the new year. May your celebrations be safe and secure and may any vulnerabilities in the next year be efficiently discovered. Greetings from our multinational team! Merry Christmas and a happy…
What Are JSON Injections
The term JSON injection may be used to describe two primary types of security issues: Server-side JSON injection happens when data from an untrusted source is not sanitized by the server and written directly to a JSON stream. Client-side JSON injection happens when data from…
What Is Session Fixation
Session fixation is a web attack technique. The attacker tricks the user into using a specific session ID. After the user logs in to the web application using the provided session ID, the attacker uses this valid session ID to gain access to the user’s…