%FILENAME%
joomscan-2012.03.10-4-x86_64.pkg.tar.xz

%NAME%
joomscan

%VERSION%
2012.03.10-4

%DESC%
Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.

%GROUPS%
archstrike
archstrike-webapps

%CSIZE%
114172

%ISIZE%
507904

%MD5SUM%
f14b20ec02dcc87df2765d18ac15569a

%SHA256SUM%
8d36e406867aed73bb26f3a943122bcc2b8d7a017481a9574e506f00759efcbd

%PGPSIG%
iQIzBAABCAAdFiEEnV8cBR0UaEPNpIWL3mSCXny8DVEFAljVTO4ACgkQ3mSCXny8DVF4Sw//aBcoBkC7kybm6uKXTLGb1cQtHA6AxeCy/ZO1anY0GX2o1WHo7iYTeRYlvykl0xiP8WbpCpBPIIqLb8wqmvtr4Bks94cOjD4nMJ9uA2djaGsB4rldJgV8VXCS/kLnSL6/3emymwjNhuyhnBrD92nCa61pDxFQP2e2+jm7oLssIC+eE28ssf92LYOT7DFk5LaA1+EvDV48/qS97Tr3cWz3WMfLpgNAYuZDq7kzuWgwY3vEGY4qvivsVRq6sseVRAGemPIRi5ALeCqryk+DLTujVjJt/4T+Z9+yYKZsAKpYnNn8QNfogRt6jMFYvNvKOShKqa1C2zExX0H9qynHpU/O7g5roO9cWZBJg/tvs8XAzbLE0/DS77cdw2nBXwcw5zEi2eJ3RutjfsmGwIBpAXSbTIQLOW96ay1gBx0z0cT8UxKf0Wn4KcTdA4HVzHK6uyeU9vayY9wqTMU4uYCm7YAYGHiOFnlt4tjTv9+WhPlBEgMAYHxx2JfGT0F0UebyW5f+uFfwTRCUqeetQuMy7fK9aNwlw+d3Okeed2U/7blMagpMRc2rUvQ61JN+/jMYtIlf3vwG21Wh0VOwuafYocHG/lEna7kdz2UNPaMLf4TD1fO+LnUJUOMSWYSFvDB67Fpxo2Y2MhC3T1f9sHFp+jgAB18BZgrmgGnbLS/qyVkF/qg=

%URL%
http://joomscan.sourceforge.net/

%LICENSE%
LGPL3

%ARCH%
x86_64

%BUILDDATE%
1490373869

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%DEPENDS%
perl-switch
perl-www-mechanize

