Compare commits

...

8 Commits

Author SHA1 Message Date
Kolja Zuelsdorf
ea020aa8a5 Bump version. 2023-06-09 12:44:12 +02:00
Erwan
4d30fecc36 Merge pull request #1786 from wpscanteam/fix/gem-push
Fixes Gem Push action
2023-06-09 11:16:45 +02:00
Erwan
369bbbe084 Fixes Gem Push action 2023-06-09 11:15:04 +02:00
Kolja Zuelsdorf
257a4a458b Bump version. 2023-06-08 14:22:40 +02:00
Kolja Zuelsdorf
9c6f1daa83 Merge pull request #1783 from wpscanteam/fix/proxy-auth
Fixed using proper proxy auth credentials when updating the database and talking to the WPScan API.
2023-06-06 15:58:57 +02:00
Miguel Xavier Penha Neto
cb9701eaef Update README.md 2023-05-28 00:25:01 -03:00
Miguel Xavier Penha Neto
afc2fe2f79 Merge pull request #1784 from wpscanteam/revert-1757-master
Update Daily API Request Limit
2023-05-25 12:53:18 -03:00
Kolja Zuelsdorf
c7919e3c75 Fixed using proper proxy auth credentials when updating the database and talking to the WPScan API. 2023-05-17 14:44:29 +02:00
5 changed files with 5 additions and 5 deletions

View File

@@ -14,7 +14,7 @@ jobs:
- name: Set up Ruby 2.6
uses: ruby/setup-ruby@v1
with:
ruby-version: 2.6.x
ruby-version: 2.6
#- name: Publish to GPR
# run: |

View File

@@ -90,7 +90,7 @@ The DB is located at ~/.wpscan/db
The WPScan CLI tool uses the [WordPress Vulnerability Database API](https://wpscan.com/api) to retrieve WordPress vulnerability data in real time. For WPScan to retrieve the vulnerability data an API token must be supplied via the `--api-token` option, or via a configuration file, as discussed below. An API token can be obtained by registering an account on [WPScan.com](https://wpscan.com/register).
Up to **75** API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once per day. When the daily 75 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data.
Up to **25** API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once per day. When the daily 25 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data.
### How many API requests do you need?

View File

@@ -73,7 +73,7 @@ module WPScan
# @return [ Hash ] The params for Typhoeus::Request
# @note Those params can't be overriden by CLI options
def request_params
@request_params ||= Browser.instance.default_connect_request_params.merge(
@request_params ||= Browser.instance.default_request_params.merge(
timeout: 600,
connecttimeout: 300,
accept_encoding: 'gzip, deflate',

View File

@@ -70,7 +70,7 @@ module WPScan
# @return [ Hash ]
# @note Those params can not be overriden by CLI options
def self.default_request_params
@default_request_params ||= Browser.instance.default_connect_request_params.merge(
@default_request_params ||= Browser.instance.default_request_params.merge(
headers: {
'User-Agent' => Browser.instance.default_user_agent,
'Authorization' => "Token token=#{token}"

View File

@@ -2,5 +2,5 @@
# Version
module WPScan
VERSION = '3.8.22'
VERSION = '3.8.24'
end