diff --git a/lib/wpscan/references.rb b/lib/wpscan/references.rb index 519200c7..725c72c6 100644 --- a/lib/wpscan/references.rb +++ b/lib/wpscan/references.rb @@ -27,7 +27,7 @@ module WPScan end def wpvulndb_url(id) - "https://wpscan.com/vulnerabilities/#{id}" + "https://wpscan.com/vulnerability/#{id}" end end end diff --git a/spec/output/main_theme/vulnerable.cli_no_colour b/spec/output/main_theme/vulnerable.cli_no_colour index 9461a9ac..f1456738 100644 --- a/spec/output/main_theme/vulnerable.cli_no_colour +++ b/spec/output/main_theme/vulnerable.cli_no_colour @@ -17,7 +17,7 @@ | | [!] Title: Dignitas 1.1.9 - Privilage Escalation | References: - | - https://wpscan.com/vulnerabilities/7825 + | - https://wpscan.com/vulnerability/7825 | - http://research.evex.pw/?vuln=6 | - https://packetstormsecurity.com/files/130652/ | diff --git a/spec/output/wp_version/with_vulns.cli_no_colour b/spec/output/wp_version/with_vulns.cli_no_colour index 17303580..702156ae 100644 --- a/spec/output/wp_version/with_vulns.cli_no_colour +++ b/spec/output/wp_version/with_vulns.cli_no_colour @@ -5,12 +5,12 @@ | | [!] Title: WP 3.8.1 - Vuln 1 | CVSS: 5.4 (VECTOR) - | Reference: https://wpscan.com/vulnerabilities/1 + | Reference: https://wpscan.com/vulnerability/1 | | [!] Title: WP 3.8.1 - Vuln 2 | Fixed in: 3.8.2 | References: - | - https://wpscan.com/vulnerabilities/2 + | - https://wpscan.com/vulnerability/2 | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0166 | - url-2 | - url-3 diff --git a/spec/shared_examples/references.rb b/spec/shared_examples/references.rb index c9fcd70e..297ee3bf 100644 --- a/spec/shared_examples/references.rb +++ b/spec/shared_examples/references.rb @@ -33,11 +33,11 @@ shared_examples WPScan::References do its(:cve_urls) { should eql %w[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11] } its(:wpvulndb_ids) { should eql %w[12] } - its(:wpvulndb_urls) { should eql %w[https://wpscan.com/vulnerabilities/12] } + its(:wpvulndb_urls) { should eql %w[https://wpscan.com/vulnerability/12] } its(:references_urls) do should eql [ - 'https://wpscan.com/vulnerabilities/12', + 'https://wpscan.com/vulnerability/12', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11' ] end