This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Joomla Vulnerability Scanner Limitations"

From OWASP
Jump to: navigation, search
(New page: ==Limitations== * The vulnerability database still lacks of unknown exploit checks (We need contributors for it) * There are dozens of vulnerability information left to be added * Scanner...)
 
(Limitations on Current Release)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Limitations==
+
==Limitations on Current Release==
  
* The vulnerability database still lacks of unknown exploit checks (We need contributors for it)
+
* The vulnerability database still lacks of unknown exploit checks. If the exploit check is not available, the scanner verify based on deduced version.  If deduced version is not available, it then cannot verify the vulnerability
* There are dozens of vulnerability information left to be added
+
* The Scanner lacks IDS evasion bypass
* Scanner lacks IDS evasion bypass [TODO]
+
* The Scanner lacks sophisticated fuzzing
 +
* The Scanner is not a full fledged SQL Injection tool
  
  
 
[[Category:OWASP_Joomla_Vulnerability_Scanner_Project]]
 
[[Category:OWASP_Joomla_Vulnerability_Scanner_Project]]

Latest revision as of 17:58, 15 July 2009

Limitations on Current Release

  • The vulnerability database still lacks of unknown exploit checks. If the exploit check is not available, the scanner verify based on deduced version. If deduced version is not available, it then cannot verify the vulnerability
  • The Scanner lacks IDS evasion bypass
  • The Scanner lacks sophisticated fuzzing
  • The Scanner is not a full fledged SQL Injection tool