Port details on branch 2022Q3 |
- gwee Tool to exploit command execution vulnerabilities in web scripts
- 1.36 security
=1 1.36Version of this port present on the latest quarterly branch.
- DEPRECATED: Abandonware, last release 15+ years ago and dead upstream
This port expired on: 2022-03-31
- There is no maintainer for this port.
- Any concerns regarding this port should be directed to the FreeBSD Ports mailing list via ports@FreeBSD.org
- Port Added: 2005-10-09 18:22:11
- Last Update: 2022-03-31 20:31:14
- Commit Hash: 97cf09b
- People watching this port, also watch:: python, grepcidr, monit
- Also Listed In: www
- License: not specified in port
- Description:
- gwee (Generic Web Exploitation Engine) is a small program written in C designed
to exploit input validation vulnerabilities in web scripts, such as Perl CGIs,
PHP, etc.
- ¦ ¦ ¦ ¦
- Manual pages:
-
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- No installation instructions:
- This port has been deleted.
- PKGNAME: gwee
- Flavors: there is no flavor information for this port.
- distinfo:
- SHA256 (gwee-1.36.tar.gz) = 5b057dc779cbc8e9e663251dac2448b253002f74a9570a2e50b915bf2bed149b
SIZE (gwee-1.36.tar.gz) = 313562
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- python3.8 : lang/python38
- perl5>=5.32.r0<5.33 : lang/perl5.32
- Runtime dependencies:
-
- python3.8 : lang/python38
- perl5>=5.32.r0<5.33 : lang/perl5.32
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- security_gwee
- USES:
- perl5 python ssl
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|