gwee (Generic Web Exploitation Engine) is a small program written in C designed to exploit input validation vulnerabilities in web scripts, such as Perl CGIs, PHP, etc. WWW: http://tigerteam.se/dl/gwee/ How-To-Repeat: # mkdir /usr/ports/www/gwee ; cd /usr/ports/www/gwee # sh gwee.shar # make install clean
Commiter, please make sure that the maintainer section is set to chinsan@mail2000.com.tw instead of ports@. -- Edwin Groothuis edwin@freebsd.org http://www.mavetju.org
Sorry, please sign me(chinsan.tw@gmail.com) as port's maintainer. Thank you. ~_~"
Hi: Please fetch http://bbs.ilc.edu.tw/~chinsan/gwee.shar This shar file including mime current email as port's maintainer. Thank you! ^_^
Responsible Changed From-To: freebsd-ports-bugs->ehaupt I will take it.
State Changed From-To: open->closed Note: Port did not respect CFLAGS, use USE_PYTHON instead of pulling lang/python as RUN_DEPEND. Committed, thanks!