WebApp Sec mailing list archives

Paros 3.2.10 Release


From: contact () parosproxy org
Date: 10 Apr 2006 15:48:39 -0000

Paros 3.2.10 is released.  This version is essentially a maintenance release with several bug fixes.  All users are 
recommended to upgrade to this version.

The new verison is available at http://www.parosproxy.org.

Bug reports and comments on Paros can be sent to [contact at parosproxy org].

[Installation]

If you have installed the old version on or after 3.2.4, you can directly install this new version.

If you are using version prior to 3.2.4, you should uninstall the old version first.

Default installation will use a maximum VM size of 64M. For large application testing, you may adjust it depending on 
your need
and the memory you have (eg 128M)


[introduction]

Paros is a man-in-the-middle proxy and application vulnerability scanner. It allows
users to intercept, modify and debug HTTP and HTTPS data on-the-fly between web
server and client browser. It also supports spidering, proxy-chaining, filtering
and application vulnerability scanning.


[License] - Clarified Artistic License (open source and GPL-compatible license)


[Details/new features]

3.2.10
======

Fix
-       Tracking session state problem reported (previously only restart can reset session state).
-       Paros startup problem when added server authentication into authentication panel.
-       Authentnciation entry reappear even after deleted (when proxy reloads).

-------------------------------------------------------------------------
Sponsored by: Watchfire

Watchfire's AppScan is the industry's first and leading web application 
security testing suite, and the only solution to provide comprehensive 
remediation tasks at every level of the application. Change the way you 
think about application security testing - See for yourself. 
Download a Free Trial of AppScan 6.0 today!

https://www.watchfire.com/securearea/appscansix.aspx?id=701300000007kaF
--------------------------------------------------------------------------


Current thread: