joomscan
joomscan copied to clipboard
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
> error while executing the program "perl joomscan.pl" 
Hi ! thanks for this incredible work ! is there any way to update the database vulnerability ? the database is now only for joomla website which is build before...
When the detected version of the component matches the vulnerable version stored in db, the scanner does not output "[!] We found vulnerable component". Instead, it outputs "the version was...
If we try to directly run joomscan on Linux, we get: ``` $ ./joomscan.pl zsh: ./joomscan.pl: bad interpreter: /usr/bin/perl^M: no such file or directory ``` If we convert it with...
Added known exploitable component names
You should skip reporting vulnerability information when component version is not vulnerable.
When I was tested joomla sites by the joomscan, I found the incorrect report about components vulnerability. It's 2 issues. Please fix it. 1. Not report vulnerability even if sites...
I have tried few times to scan the latest Joomla default install. This seems to be not working. The version shows as 1.5 and just lists the vulnerabilities in there,...
Joomla! Component Amblog 1.0 - Multiple SQL Injections https://www.exploit-db.com/exploits/14596 This vulnerability was not detected by JoomScan although it exists and tested successfully with SQLMap and manual exploitation techniques.