[Python-apps-commits] r9814 - in packages/wapiti/trunk/debian (changelog control)
adejong at users.alioth.debian.org
adejong at users.alioth.debian.org
Fri Jun 28 13:07:52 UTC 2013
Date: Friday, June 28, 2013 @ 13:07:51
Author: adejong
Revision: 9814
Update package description.
Modified:
packages/wapiti/trunk/debian/changelog
packages/wapiti/trunk/debian/control
Modified: packages/wapiti/trunk/debian/changelog
===================================================================
--- packages/wapiti/trunk/debian/changelog 2013-06-28 12:40:30 UTC (rev 9813)
+++ packages/wapiti/trunk/debian/changelog 2013-06-28 13:07:51 UTC (rev 9814)
@@ -17,11 +17,12 @@
* Update debian/copyright file.
* Update debian/watch file.
* Update to Standards-Version to 3.9.4.
+ * Update package description.
[ Jakub Wilk ]
* Use canonical URIs for Vcs-* fields.
- -- Arthur de Jong <adejong at debian.org> Fri, 28 Jun 2013 14:37:26 +0200
+ -- Arthur de Jong <adejong at debian.org> Fri, 28 Jun 2013 15:07:14 +0200
wapiti (1.1.6-4) unstable; urgency=low
Modified: packages/wapiti/trunk/debian/control
===================================================================
--- packages/wapiti/trunk/debian/control 2013-06-28 12:40:30 UTC (rev 9813)
+++ packages/wapiti/trunk/debian/control 2013-06-28 13:07:51 UTC (rev 9814)
@@ -12,17 +12,19 @@
Architecture: all
Depends: ${misc:Depends}, ${python:Depends}, python-beautifulsoup, python-httplib2, libjs-jquery
Homepage: http://wapiti.sourceforge.net/
-Description: Web application vulnerability scanner
+Description: web application vulnerability scanner
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the
- application but will scans the web pages of the deployed web applications,
+ application but will scan the web pages of the deployed web applications,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
if a script is vulnerable.
+ .
Wapiti can detect the following vulnerabilities:
- - File Handling Errors (Local and remote include/require, fopen, ...)
- - Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
- - XSS (Cross Site Scripting) Injection
- - LDAP Injection
- - Command Execution detection (eval(), system(), passtru()...)
- - CRLF Injection (HTTP Response Splitting, session fixation...)
+ - file handling errors (local and remote include/require, fopen,
+ readfile...)
+ - database injection (PHP/JSP/ASP SQL Injections and XPath Injections)
+ - XSS (Cross Site Scripting) injection
+ - LDAP injection
+ - command execution detection (eval(), system(), passtru()...)
+ - CRLF injection (HTTP response splitting, session fixation...)
More information about the Python-apps-commits
mailing list