[Python-apps-commits] r9814 - in packages/wapiti/trunk/debian (changelog control)

adejong at users.alioth.debian.org adejong at users.alioth.debian.org
Fri Jun 28 13:07:52 UTC 2013


    Date: Friday, June 28, 2013 @ 13:07:51
  Author: adejong
Revision: 9814

Update package description.

Modified:
  packages/wapiti/trunk/debian/changelog
  packages/wapiti/trunk/debian/control

Modified: packages/wapiti/trunk/debian/changelog
===================================================================
--- packages/wapiti/trunk/debian/changelog	2013-06-28 12:40:30 UTC (rev 9813)
+++ packages/wapiti/trunk/debian/changelog	2013-06-28 13:07:51 UTC (rev 9814)
@@ -17,11 +17,12 @@
   * Update debian/copyright file.
   * Update debian/watch file.
   * Update to Standards-Version to 3.9.4.
+  * Update package description.
 
   [ Jakub Wilk ]
   * Use canonical URIs for Vcs-* fields.
 
- -- Arthur de Jong <adejong at debian.org>  Fri, 28 Jun 2013 14:37:26 +0200
+ -- Arthur de Jong <adejong at debian.org>  Fri, 28 Jun 2013 15:07:14 +0200
 
 wapiti (1.1.6-4) unstable; urgency=low
 

Modified: packages/wapiti/trunk/debian/control
===================================================================
--- packages/wapiti/trunk/debian/control	2013-06-28 12:40:30 UTC (rev 9813)
+++ packages/wapiti/trunk/debian/control	2013-06-28 13:07:51 UTC (rev 9814)
@@ -12,17 +12,19 @@
 Architecture: all
 Depends: ${misc:Depends}, ${python:Depends}, python-beautifulsoup, python-httplib2, libjs-jquery
 Homepage: http://wapiti.sourceforge.net/
-Description: Web application vulnerability scanner
+Description: web application vulnerability scanner
  Wapiti allows you to audit the security of your web applications.
  It performs "black-box" scans, i.e. it does not study the source code of the
- application but will scans the web pages of the deployed web applications,
+ application but will scan the web pages of the deployed web applications,
  looking for scripts and forms where it can inject data.
  Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
  if a script is vulnerable.
+ .
  Wapiti can detect the following vulnerabilities:
-    - File Handling Errors (Local and remote include/require, fopen, ...)
-    - Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
-    - XSS (Cross Site Scripting) Injection
-    - LDAP Injection
-    - Command Execution detection (eval(), system(), passtru()...)
-    - CRLF Injection (HTTP Response Splitting, session fixation...)
+  - file handling errors (local and remote include/require, fopen,
+    readfile...)
+  - database injection (PHP/JSP/ASP SQL Injections and XPath Injections)
+  - XSS (Cross Site Scripting) injection
+  - LDAP injection
+  - command execution detection (eval(), system(), passtru()...)
+  - CRLF injection (HTTP response splitting, session fixation...)




More information about the Python-apps-commits mailing list