From db8cfe26c7702126b4b37d17c14577084f6e0070 Mon Sep 17 00:00:00 2001 From: Ryan Dewhurst Date: Mon, 1 Feb 2021 13:32:17 +0100 Subject: [PATCH] Updated WPScan User Documentation (markdown) --- WPScan-User-Documentation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/WPScan-User-Documentation.md b/WPScan-User-Documentation.md index 35c6f97..4aa7dd6 100644 --- a/WPScan-User-Documentation.md +++ b/WPScan-User-Documentation.md @@ -83,7 +83,7 @@ _Please note that this data does not include the vulnerability data. See [Vulner The WPScan CLI tool uses the [WordPress Vulnerability Database API](https://wpscan.com/api) to retrieve WordPress vulnerability data in real time. For WPScan to retrieve the vulnerability data an API token must be supplied via the `--api-token` option, or via a configuration file. An API token can be obtained by registering an account on [WPScan.com](https://wpscan.com/register). -Up to 25 API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once. When the daily 25 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data. Users can upgrade to paid API usage to increase their API limits within their user profile on [WPScan.com](https://wpscan.com/). +Up to 25 API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once per day. When the daily 25 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data. Users can upgrade to paid API usage to increase their API limits within their user profile on [WPScan.com](https://wpscan.com/). #### The Free plan allows 25 API requests per day. View the different [available API plans](https://wpscan.com/api).