wapiti 3.0.2+dfsg-1 source package in Ubuntu

Changelog

wapiti (3.0.2+dfsg-1) unstable; urgency=medium

  * Update email address in patches
  * New upstream version 3.0.2+dfsg
  * Bump compat level to 12
  * Bump std-version to 4.4.0
  * Bump copyright years
  * Refresh patches
  * Add some new dependencies
  * Run testsuite but ignore test results, some tests require php servers and
    similar

 -- Gianfranco Costamagna <email address hidden>  Thu, 05 Sep 2019 15:25:54 +0200

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
all
Section:
python
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Eoan: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
wapiti_3.0.2+dfsg-1.dsc 2.1 KiB fabeba5c48239fd7c27450f6eb244fdaf6c68462c712fcd86f014c3a1e00a522
wapiti_3.0.2+dfsg.orig.tar.gz 514.1 KiB b27caf6b868ee66301797389af8990d5efd5af3faa1301c301726f5bc8fef1d7
wapiti_3.0.2+dfsg-1.debian.tar.xz 23.6 KiB e7e18573c083aa76ebae096799b3edaf70e0b49f3bff998b315276e6bf83c4ed

Available diffs

No changes file available.

Binary packages built by this source

wapiti: web application vulnerability scanner

 Wapiti allows you to audit the security of your web applications.
 It performs "black-box" scans, i.e. it does not study the source code of the
 application but will scan the web pages of the deployed web applications,
 looking for scripts and forms where it can inject data.
 Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
 if a script is vulnerable.
 .
 Wapiti can detect the following vulnerabilities:
  - Database Injection (PHP/ASP/JSP SQL Injections and XPath Injections)
  - Cross Site Scripting (XSS) reflected and permanent
  - File disclosure detection (local and remote include, require, fopen,
    readfile...)
  - Command Execution detection (eval(), system(), passtru()...)
  - XXE (Xml eXternal Entity) injection
  - CRLF Injection
  - Search for potentially dangerous files on the server (thank to the Nikto db)
  - Bypass of weak htaccess configurations
  - Search for copies (backup) of scripts on the server
  - Shellshock
  - DirBuster like
  - Server Side Request Forgery (through use of an external Wapiti website)