wapiti 3.0.4+dfsg-2 source package in Ubuntu

Changelog

wapiti (3.0.4+dfsg-2) unstable; urgency=medium

  * Team upload.

  [ Debian Janitor ]
  * Use secure URI in debian/watch.
  * Use secure URI in Homepage field.
  * Bump debhelper from old 12 to 13.
  * Update standards version to 4.6.1, no changes needed.
  * Update lintian override info format in d/wapiti.lintian-overrides on line 1.

  [ Sophie Brun ]
  * Add a fix for Python 3.11 (Closes: #1032198)

 -- Sophie Brun <email address hidden>  Fri, 03 Mar 2023 15:29:34 +0100

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
all
Section:
python
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe python
Noble release universe python
Mantic release universe python
Lunar release universe python

Builds

Lunar: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
wapiti_3.0.4+dfsg-2.dsc 2.2 KiB 18f2b7f9ed46e3e2cef26f2d03755a028b4ce12f5df0b1164706f2886f2ac58c
wapiti_3.0.4+dfsg.orig.tar.xz 376.5 KiB c062276991f53112926d6ec7763360e7fa4c40dac8aa3fa4daafccd677a89439
wapiti_3.0.4+dfsg-2.debian.tar.xz 24.0 KiB 301745a1e9bdcc12a83ca184c614067031a0892046f1f04441729543ac1738d4

Available diffs

No changes file available.

Binary packages built by this source

wapiti: web application vulnerability scanner

 Wapiti allows you to audit the security of your web applications.
 It performs "black-box" scans, i.e. it does not study the source code of the
 application but will scan the web pages of the deployed web applications,
 looking for scripts and forms where it can inject data.
 Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
 if a script is vulnerable.
 .
 Wapiti can detect the following vulnerabilities:
  - Database Injection (PHP/ASP/JSP SQL Injections and XPath Injections)
  - Cross Site Scripting (XSS) reflected and permanent
  - File disclosure detection (local and remote include, require, fopen,
    readfile...)
  - Command Execution detection (eval(), system(), passtru()...)
  - XXE (Xml eXternal Entity) injection
  - CRLF Injection
  - Search for potentially dangerous files on the server (thank to the Nikto db)
  - Bypass of weak htaccess configurations
  - Search for copies (backup) of scripts on the server
  - Shellshock
  - DirBuster like
  - Server Side Request Forgery (through use of an external Wapiti website)