Fixed Zope Web Server Version Disclosure security check signature.
Fixed Grafana Version Disclosure security check signature.
Fixed ASP.NET MVC Version Disclosure security check signature.
Fixed Telerik Version Disclosure vulnerability severity to be low.
Fixed IIS Version Disclosure vulnerability severity to be low.
Fixed the grammar issues at the CSP Not Implemented report template.
Hide the scope tooltip at the manual authentication panel.
Fixed the order of Out-of-Date vulnerabilities; now sorting vulnerabilities by their severities.
Fixed the issue “link stuck error” was repeated many times in the scan logs.
Fixed the typo in the Pre-Request Scripts Menu.
Fixed a few typos in the Impact descriptions.
Fixed validating WAF settings before trying to test WAF connection
Fixed the issue where the Exclude Authentication Pages option could not be manually disabled when the Form Authentication is enabled.
Fixed an issue where the Form Authentication verification dialog loses focus and disappears.
Fixed directory modifiers limit usage
Fixed sending previous request headers while navigating to the Form Authentication’s latest response URL.
Fixed an issue where the custom script dialog failed to display login page when requests encoded with Brotli
Fixed an issue that causes Reflected Parameter analyzer attacks to the ignored parameters when the breach engine is disabled
Fixed an issue that may cause the null reference exception when reflected parameter analyzer working
Fixed an issue that caused WASC ID is not sent properly in the Kenna Send To Action
Fixed an issue where the HTTP request is not redirected to HTTPS when Strict Transport Security is enabled
Fixed an issue that caused DOM simulation to fail because of the null windows and elements
Fixed an issue that is caused by NTLM, Kerberos, Negotiate authentication credentials send with every request without challenge
Fixed an issue that causes the Pre-Request Script requests to be ignored when its method is disallowed from the Scope settings
Fixed an issue that causes raw request created without cookies
Added SSL, Attack Possibility, and JavaScript files to Knowledge Base
Fixed the order of classification report ribbon menu.
Fixed handling the invalid characters of request headers set from the Pre-Request Scripts.
Fixed the tooltip of Send To Tasks button at the ribbon
Fixed unwanted warning on the auto authenticator
Fixed date and time zone problem on Swagger file.
Fixed null reference exception on excluded URL check.
Fixed multiple instance knowledge base render problem.
Fixed reporting style issues.
Fixed relativity of the charts in the Comparison Report.
Fixed grid showing on the logout detection screen.
Fixed scan resuming problem on unavailable host.
Fixed pop-up problem on the DOM simulation for better performance.
Fixed the logo at the Knowledge Base render error page.
Fixed an issue which causes unhandled exception when the link clicked multiple times on authentication verify dialog when interactive login is enabled
Fixed internet connection problem at test site configuration dialog.
Added information label to the Azure Configuration wizard.
Fixed request and response results in out-of-band vulnerabilities.
Fixed Blind SQL Injection cache issue.
Fixed wrong expiry time for cookie which occurs at DOM simulation.
Fixed the null reference exception while checking the source type.
Fixed the Basic Authentication header problem for chromium requests.
Fixed the null reference exception while getting authorization tokens.
Fixed an issue where XSLT requests are not intercepted.
Fixed Netsparker Helper Service dll not found issue.
Fixed the client certificate selection issue while logging in to the target website.
Fixed session storage problem at DOM simulation.
Fixed upload request problem that creates false positive at LFI engine.
Fixed chromium errors at authentication
Fixed the unhandled multiple choices redirect status code at requester.
Fixed the keyword-based logout detection stuck when the pop-up opened at chromium browsers.
Fixed the Generate Exploit button label in the ribbon menu and vulnerability pop-up menu.
Fixed an issue where the form value parser was not working.
Fixed unauthorized request handling in the license view.
Fixed an issue that causes invalid parent issue selection if Check Inverse is used at Security Checks
Fixed maximum logout detection issue.
Fixed the typo in the Pre-request Scripts menu.
Fixed a few typos in the Impact descriptions.
Fixed the issue that email disclosure was reported without identified email addresses.
Fixed an issue in the scan policy optimizer where the DOM preset was set wrong.
Removed URL signature field from the phpinfo detection pattern.
Fixed Perl version disclosure pattern.
Fixed the issue that movable type cannot be detected because the app name contained whitespace.
Removed the Fiddler core dependency from Fiddler Importer that caused issues in Linux agents.
Fixed the custom script dialog title.
Fixed the signature of Python version disclosure pattern.
Fixed the issue that charset error was repeated many times in the logs.
Fixed the issue that the attack parameter name was not displayed on error based SQL injection vulnerabilities.
Fixed an ArgumentNullException that was thrown when the proxy bypass list is null.
Fixed the request parsing error in TCP Requester.
Fixed the issue that header and footer were mixed up in the reports.
Fixed info icons position in the Knowledge Base reports.
Fixed the issue XSS payload was not highlighted correctly.
Fixed the typo in the base scan CLI argument.
Fixed the issue that the confirmation dialog was not displayed when the delete rows button in the context menu is used.
Fixed the inconsistencies in the summary page of Asana configuration wizard.
Fixed tooltip enabled/disabled states in Form Authentication, Client Certificate, and Smart Card Authentication settings.
Fixed the issue that search results were not highlighted correctly.
Fixed the issue that URL was not correctly encoded in Send To Action templates.
Fixed the issue request.Headers was empty in custom script API.
Fixed the issue Mithril version could not be detected.
Fixed the issue that SSTI could not be detected consistently because the code execution patterns were not loaded correctly.
Fixed the issue that version disclosure vulnerabilities were always fixed in retest.
Fixed the issue that causes FP Open Redirection because of the improper decoding of location header
Fixed Swagger parser that caused importing object with a parent node while the object is inside an array
By using this website you agree with our use of cookies to improve its performance and enhance your experience. More information in our Privacy Policy.