You are here: SecPoint & IT Security News
Discover how easily to submit a VulnerabilityVulnerability to the database of the Penetrator Vulnerability Scanner Vulnerability Assessment Have you discovered a vulnerability that is not already in the database. Then you can easily submit it. The Support team will get back to you as soon as possible on when the new vulnerability is implemented. Add your own custom made Vulnerability Checks to the databaseEasily submit your own vulnerability signatures making your own custom made Penetrator vulnerability scanner database.. It can be useful to add your own vulnerability signatures if you have done your own Penetration Testing and discovered vulnerabilities that might not be in the Penetrator. Popular vulnerabilities to discover that might not yet be public can be vulnerabilities in Web applications, XSS , SQL injection, vulnerabilities in routers web interfaces. Or any other type of vulnerability. Once it has been added to the Penetrator Vulnerability Scanner Database 9+ profiles to choose from when doing vulnerability scanningDepending on the type of vulnerability signature you are adding to the database it will be added to the correct profile. You can read more about the profiles in the Penetrator Vulnerability Scanner Profile guide. This way you can deploy the correct vulnerability scanning profile for your requirements when scanning. Have you detected or discovered vulnerabilities on your own network or that you just want to add you can easily submit it to the Penetrator Vulnerability Scanner database. Customize the database after your choice and use the vulnerabilities that you would like to include. Custom the Penetrator to fit your network infrastructure and to discover vulnerabilities across your network. Scan local and public IP addresses with the vulnerabilities that you have submitted. Submit Vulnerability Scanning Signatures for multiple platformsWhen you submit a vulnerability it can be valid for all platforms including Cloud Penetrator Vulnerability Scanner, Virtual VMware ESXi, Player, MS Hyper-V, and Linux Appliance versions. Fast Security ImplementationPlease click the video below to watch how you can easily do it. To find out more about how to obtain the Penetrator Vulnerability Scanner if you do not already have it please see the link below. |