This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Key Project Information:OWASP Joomla Vulnerability Scanner Project"
From OWASP
D0ubl3 h3lix (talk | contribs) |
|||
(8 intermediate revisions by 2 users not shown) | |||
Line 4: | Line 4: | ||
|- | |- | ||
| style="width:15%; background:#7B8ABD" align="center"|'''Project Name''' | | style="width:15%; background:#7B8ABD" align="center"|'''Project Name''' | ||
− | | colspan="7" style="width:85%; background:#cccccc" align="left"|<font color="black">'''OWASP Joomla Vulnerability Scanner Project(OJVS)''' | + | | colspan="7" style="width:85%; background:#cccccc" align="left"|<font color="black">'''OWASP Joomla Vulnerability Scanner Project (OJVS)''' |
|- | |- | ||
| style="width:15%; background:#7B8ABD" align="center"| '''Short Project Description''' | | style="width:15%; background:#7B8ABD" align="center"| '''Short Project Description''' | ||
| colspan="7" style="width:85%; background:#cccccc" align="left"| | | colspan="7" style="width:85%; background:#cccccc" align="left"| | ||
− | A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution,XSS, DOS,directory traversal vulnerabilities of a target Joomla! web site. | + | A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. |
|- | |- | ||
| style="width:15%; background:#7B8ABD" align="center"| | | style="width:15%; background:#7B8ABD" align="center"| | ||
Line 19: | Line 19: | ||
Mailing List<br>[https://lists.owasp.org/mailman/listinfo/owasp-joomla-vulnerability-scanner '''Subscribe here''']<br>[mailto:[email protected] '''Use here'''] | Mailing List<br>[https://lists.owasp.org/mailman/listinfo/owasp-joomla-vulnerability-scanner '''Subscribe here''']<br>[mailto:[email protected] '''Use here'''] | ||
| style="width:17%; background:#cccccc" align="center"| | | style="width:17%; background:#cccccc" align="center"| | ||
− | License<br>[http:// | + | License<br> [http://www.fsf.org/licensing/licenses/gpl.html '''GNU GENERAL PUBLIC LICENSE Version 3'''] |
| style="width:14%; background:#cccccc" align="center"| | | style="width:14%; background:#cccccc" align="center"| | ||
− | Project Type<br>[https://www.owasp.org/index.php/Category:OWASP_Project#tab= | + | Project Type<br>[https://www.owasp.org/index.php/Category:OWASP_Project#tab=Beta_Status_Projects '''Tool'''] |
| style="width:15%; background:#cccccc" align="center"| | | style="width:15%; background:#cccccc" align="center"| | ||
Sponsors<br>[http://yehg.net/ '''YGN Ethical Hacker Group, Myanmar'''] | Sponsors<br>[http://yehg.net/ '''YGN Ethical Hacker Group, Myanmar'''] | ||
Line 31: | Line 31: | ||
|- | |- | ||
| style="width:29%; background:#cccccc" align="center"| | | style="width:29%; background:#cccccc" align="center"| | ||
− | '''[[:Category:OWASP Project Assessment# | + | '''[[:Category:OWASP Project Assessment#Beta Quality Tool Criteria|Beta Quality]]'''<br>[[:OWASP Joomla Vulnerability Scanner Project - Assessment Frame|Please see here for complete information.]] |
| style="width:42%; background:#cccccc" align="center"| | | style="width:42%; background:#cccccc" align="center"| | ||
* [http://yehg.net/lab/pr0js/files.php/joomscan-latest.zip Primary Source to download] | * [http://yehg.net/lab/pr0js/files.php/joomscan-latest.zip Primary Source to download] | ||
Line 40: | Line 40: | ||
|} | |} | ||
---- | ---- | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Latest revision as of 16:58, 8 July 2009
PROJECT INFORMATION | |||||||
---|---|---|---|---|---|---|---|
Project Name | OWASP Joomla Vulnerability Scanner Project (OJVS) | ||||||
Short Project Description |
A regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site. | ||||||
Key Project Information |
Project Leader |
Project Contibutors |
Mailing List |
Project Type |
Release Status | Main Links | Related Projects |
---|---|---|