Peter van der Laan
ac9647d2b2
Output the vulnerability fix if available
...
It just shows if there is a vulnerability fix.
It doesn't check if the fix matches with the current plugin version.
So you should check manually if you need to upgrade or not.
2013-10-29 13:42:40 +01:00
Peter van der Laan
10cb883904
Update output.rb
2013-10-23 13:37:00 +02:00
erwanlr
474816762f
Use less memory when brute forcing with a large wordlist
2013-10-05 20:03:34 +01:00
erwanlr
f4460f315e
Fix #249 & #275
2013-10-02 15:36:02 +01:00
sullo
870201de14
Don't skip passwords that start with a hash. This is fairly common (see RockYou list for example).
2013-09-12 09:30:23 -04:00
Christian Mehlmauer
5cc9df9599
urls
2013-08-25 09:38:25 +02:00
Christian Mehlmauer
a032b7c134
more reference tags, fixes issue #268
2013-08-24 11:16:39 +02:00
Christian Mehlmauer
fc75b315f9
bugfix
2013-08-23 14:02:58 +02:00
Christian Mehlmauer
1f5cb4b0a0
added cve tag to xml file
2013-08-23 14:02:09 +02:00
erwanlr
669e1458da
Fix #208 - Fixed vulnerable plugins still appear in the results
2013-07-24 14:18:02 +02:00
Christian Mehlmauer
d2696a53ef
minor updates
2013-06-09 16:13:56 +02:00
Christian Mehlmauer
c63beaa35d
rspecs
2013-06-09 15:57:41 +02:00
Christian Mehlmauer
1bcabbad4c
use the redirect_to parameter on bruteforce
2013-06-09 15:27:39 +02:00
Christian Mehlmauer
7f10462189
Merge branch 'master' of github.com:wpscanteam/wpscan
2013-05-10 21:59:47 +02:00
Christian Mehlmauer
7a7450f98e
rspecs and bugfixing(Can't dup nilclass on missing readme.txt) #179
2013-05-10 19:24:17 +02:00
erwanlr
42efc9f9ec
Fix #182 Remove the progress-bar static length (120), and let it to automatic
2013-05-10 17:44:22 +02:00
Christian Mehlmauer
cdd74b535b
rspecs #179
2013-05-07 20:46:08 +02:00
Christian Mehlmauer
3e9c51f18e
some more work for #179
2013-05-06 23:36:18 +02:00
Christian Mehlmauer
4ce6396e3f
removed debug output #179
2013-05-06 23:30:47 +02:00
Christian Mehlmauer
9c0ce2a1cd
fix rspecs #179
2013-05-06 22:47:20 +02:00
Christian Mehlmauer
77ebd9d4fd
Fixed Version compare for issue #179
2013-05-06 22:33:18 +02:00
erwanlr
2f7db7312e
Remove useless code
2013-04-18 12:44:06 +02:00
erwanlr
5a097d429d
Code Factoring
2013-04-18 11:22:19 +02:00
erwanlr
662d94e958
Complexity reduced
2013-04-17 15:40:09 +02:00
erwanlr
4c57a00660
Trying to reduce the complexity of WpUser#brute_force
2013-04-17 12:48:18 +02:00
erwanlr
3f8bc5e01a
Fixes hacks.rb conflict
2013-04-16 14:19:30 +02:00
erwanlr
7143c7ffe9
WpUser#brute_force Browser.instance replaced by a local var
2013-04-15 15:55:48 +02:00
erwanlr
b1ce7bdcc5
Fixes #164 README.txt detection
2013-04-15 15:02:09 +02:00
erwanlr
df5b8b9c35
WpItems agressive detection progress bar
2013-04-14 18:01:24 +02:00
erwanlr
446910767b
BruteForcer progress bar
2013-04-14 17:30:57 +02:00
erwanlr
6cd349cb24
Code Factoring
2013-04-14 12:51:53 +02:00
erwanlr
4f182dc41b
Format the output of WpUser::BruteForcable
2013-04-13 19:02:14 +02:00
erwanlr
704c6b1669
Detection of the wordlist charset
2013-04-13 18:56:47 +02:00
erwanlr
5d327f5060
Reverts #122 Don't encode login & password as they will be encoded in Typhoeus
2013-04-13 18:02:12 +02:00
erwanlr
92d690e357
Missing @param
2013-04-13 11:04:23 +02:00
erwanlr
7db63bb3e0
BruteForcer moved in WpUser as a module
2013-04-12 21:52:33 +02:00
erwanlr
777f06608b
Gemfile conflict
2013-04-11 21:15:12 +02:00
erwanlr
dc109f12d8
Fixes #163 in the proper way
2013-04-11 12:51:55 +02:00
erwanlr
3525fb87e2
Browser::Actions (no specs)
2013-04-09 17:43:15 +02:00
erwanlr
a9b25edafe
WpUser additional specs
2013-03-30 19:08:47 +01:00
erwanlr
21f5acf62f
WpUsers::Detectable specs
2013-03-30 16:33:39 +01:00
erwanlr
07e5a532c1
WpTimthumbs::Detectable specs
2013-03-30 16:03:46 +01:00
erwanlr
565bfceb49
WpVersion::Findable specs
2013-03-28 20:48:19 +01:00
erwanlr
a7bd5044c4
WpVersion::Vulnerable specs
2013-03-28 15:33:35 +01:00
erwanlr
ec9eadda8e
WpUser::Existable specs
2013-03-27 16:52:32 +01:00
erwanlr
be0aad2c66
WpTimthumb::Versionable specs
2013-03-26 17:12:57 +01:00
erwanlr
65ca256a73
WpTimthumb::Existable specs
2013-03-26 16:46:39 +01:00
erwanlr
da1c556896
WpTheme::Vulnerable specs
2013-03-26 16:26:03 +01:00
erwanlr
ba0af6edda
WpTheme::Versionable specs
2013-03-26 16:04:10 +01:00
erwanlr
40f4057d47
WpTheme::Findable specs
2013-03-26 15:34:48 +01:00