🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management
100% Signal 0% Noise
Platform
Platform Overview
ASPM
API Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
Cost Savings Calculator
Features
Solutions
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Case Studies
Invicti Learn
Live Training
Partners
Documentation
Get a demo
Home
/
Documentation
/
Invicti Standard Release Notes
Invicti Product Release Notes
Invicti Enterprise On-Demand
Invicti Enterprise On-Premises
Invicti Standard
Invicti Application Security Platform
Release Notes

Invicti Standard

RSS FEED
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • Client Certificate Authentication Support
  • Vulnerability Classification data reported the GUI and reports
  • New Save / Load Files.

NEW WEB SECURITY TEST

  • Blind Command Injection.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • Controlled Scan
  • Retest single vulnerability.

NEW WEB SECURITY TESTS

  • Silverlight Open Access Policy / Silverlight Access Policy Found Checks
  • Django Stack Trace Disclosure Check
  • MySQL Username Disclosure Check
  • New Backup File Checks
  • X-XSS-Protection Check.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • Import / Enter Proxy Logs and HTTP Requests
  • Manual Crawling / Internal Proxy / Proxy Mode
  • Ability to Include & Exclude links
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • New Settings Interface
  • Resume Support
  • Better GUI for Permanent XSS vulnerabilities.

NEW WEB SECURITY TEST

  • Second Order SQL Injection.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURE

  • Anti-CSRF Token Support.

NEW WEB SECURITY TESTS

  • Brute Force Support
  • Tomcat Source Code Disclosure
  • Default Tomcat Page Identified
  • Frame Injection
  • Backdoor Detection
  • Sensitive Files Detection.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • Scheduling Support
  • Command Line Automation Support
  • ViewState Panel.

NEW WEB SECURITY TESTS

  • ASP.NET Viewstate Analyzer
  • Confirmation for Remote code evaluation
  • Confirmation for Remote file inclusion
  • Confirmation for Command Injection.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • New reporting format
  • New Security Tests
  • Open Redirection.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

NEW FEATURES

  • Encoder
  • Custom Reporting API
  • New Security Tests
  • Confirmation for RCE
  • Confirmation for CI via LFI.
18-Mar-2015
COPY LINK

Read the blog post for more details about this version

  • First public release.
9-Mar-2015
COPY LINK

BUG FIXES

  • Fixed a bug in custom URL rewrite detection where encoded URL paths are not matched with the provided patterns.
  • Fixed a bug that occurs while displaying details of an XSS vulnerability discovered on a redirected page.
9-Mar-2015
COPY LINK

BUG FIXES

  • Fixed a critical bug which crashes DOM Parser and DOM XSS processes on Windows 8.1 systems with KB3000850 update installed
  • Fixed a bug in recrawler where the current concurrent connection count isn't honored
  • Fixed a bug in multipart/form-data parser to read parameter names with semicolons correctly
  • Fixed a bug in multipart/form-data parser to recognize the request body even if there are no parameters present
  • Fixed a bug where a form with multipart/form-data encoding type is incorrectly parsed with a POST method rather than a GET
  • Fixed an issue with DOM Parser to better simulate radio/check boxes with click event handlers attached
  • Fixed an issue with HTTP request parser to recognize the correct HTTP method with POST requests containing an empty request body
  • Fixed an issue where Content-Length header is not set to 0 with empty request bodies
  • Fixed an issue where some requests discovered using DOM Parser with POST HTTP method are recognized as GET requests
  • Fixed an issue with ASP.NET View State response viewer to show the View State data on cases where id attribute of input tag is missing
  • Fixed an ASP.NET View State parser issue occurs while reading .NET 1.x View States
Previous
1
...
Invicti Security Corp
1000 N Lamar Blvd Suite 300
Austin, TX 78703, US
© Invicti {year}
Resources
FeaturesIntegrationsPlansCase StudiesRelease NotesInvicti Learn
Use Cases
Penetration Testing SoftwareWebsite Security ScannerEthical Hacking SoftwareWeb Vulnerability ScannerComparisonsOnline Application Scanner
Web Security
The Problem with False PositivesWhy Pay for Web ScannersSQL Injection Cheat SheetGetting Started with Web SecurityVulnerability IndexUsing Content Security Policy to Secure Web Applications
Comparison
Acunetix vs. InvictiBurp Suite vs. InvictiCheckmarx vs. InvictiProbely vs. InvictiQualys vs. InvictiTenable Nessus vs. Invicti
Company
About UsContact UsDocumentationCareersResourcesPartners

Invicti Security is changing the way web applications are secured. Invicti’s dynamic and interactive application security products help organizations in every industry scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.

LegalPrivacy PolicyCalifornia Privacy RightsTerms of UseAccessibilitySitemap
Privacy Policy