Burp Suite is a graphical tool for testing Web application security. The tool is composed in Java and created by PortSwigger Security.
Burp Scanner is composed by industry-driving penetration testers. Burp Scanner incorporates a full static code investigation engine for the discovery of security vulnerabilities.
Burp’s scanning logic is persistently refreshed with upgrades to guarantee it can locate the most recent vulnerabilities.
This release adds support for 5 new Vulnerabilities
CSS injection vulnerabilities emerge when an application imports a template from a client provided URL, or implants client input in CSS hinders without sufficient escaping.
They are firmly correlated with cross-site scripting (XSS) vulnerabilities however regularly trickier to abuse it.
Link manipulation happens once associated application embeds user input into the trail or domain of URLs that seem at intervals application responses.
An attacker can use this vulnerability to construct a link that, if visited by another application user, can modify the target of URLs at intervals the response.
It’s going to be potential to leverage this to perform varied attacks, such as:
Client-side protocol parameter pollution (HPP) vulnerabilities arise once associated application embeds user input in URLs in an unsafe manner.
An attacker will use this vulnerability to construct a universal resource locator that, if visited by another application user, can modify URLs at intervals the response by inserting extra question string parameters and typically predominate existing ones.
This might lead to links and forms having sudden facet effects. The security impact of this issue depends for the most part on the character of the appliance practicality.
Form action hijacking vulnerabilities arise once application places user-supplied input into the action URL of an HTML form.
An attacker will use this vulnerability to construct an URL that, if visited by another application user, can modify the action address of a kind to purpose to the attacker’s server.
If a user submits the form then its contents, together with any input from the victim user, are going to be delivered to the attacker server.
Even if the user does not enter any sensitive info, the form should still deliver a legitimate CSRF token to the attacker, allowing them to perform CSRF attacks.
Open redirection vulnerabilities emerge when an application joins client controllable information into the target of a redirection in a dangerous way.
An attacker can develop a URL inside the application that makes a redirection to an arbitrary external domain. This conduct can be utilized to encourage phishing assaults against clients of the application.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…