summaryrefslogtreecommitdiffstats
path: root/recipes-security/nikto
Commit message (Collapse)AuthorAgeFilesLines
* nikito: Update common-licenses references to match new namesArmin Kuster2021-02-231-1/+1
| | | | Signed-off-by: Armin Kuster <akuster808@gmail.com>
* nikto: upgrade to 2.1.6 (v2)Scott Ellis2019-01-064-230/+134
| | | | | | | Source now on github. Signed-off-by: Scott Ellis <scott@jumpnowtek.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* CVE-2018-11652 nikto: arbitray OS command injection via http server field.Nagalakshmi Veeramallu2018-07-032-1/+108
| | | | | | | | | | CSV Injection vulnerability in Nikto 2.1.6 and earlier allows remote attackers to inject arbitrary OS commands via the Server field in an HTTP response header, which is directly injected into a CSV report. Signed-off-by: Nagalakshmi Veeramallu <nveeramallu@mvista.com> Reviewed-by: Jagadeesh Krishnanjanappa <jkrishnanjanappa@mvista.com> Signed-off-by: Armin Kuster <akuster@mvista.com>
* nikto: fix SRC_URI for multilibPaul Eggleton2015-01-131-1/+1
| | | | | | | | ${BPN} should be used instead of ${PN} where you want the name without any prefix (and ${BP} is short for ${BPN}-${PV}). Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* nikto: fix launching errorsArmin Kuster2015-01-031-1/+7
| | | | | | add several missing perl package depends so app can launch Signed-off-by: Armin Kuster <akuster808@gmail.com>
* nikto: fix dependsArmin Kuster2015-01-031-1/+1
| | | | Signed-off-by: Armin Kuster <akuster808@gmail.com>
* meta-security-1.0-finalAndrei Dinu2013-07-111-79/+79
| | | | Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>
* Security layer version 1.0Andrei Dinu2013-07-102-0/+137
Signed-off-by: Andrei Dinu <andrei.adrianx.dinu@intel.com>