Skip to content

Commit f61c55b

Browse files
committed
Updates DB URLs
1 parent 78d0c25 commit f61c55b

File tree

10 files changed

+13
-13
lines changed

10 files changed

+13
-13
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
WordPress Security Scanner
1111
<br>
1212
<br>
13-
<a href="https://wpscan.org/" title="homepage" target="_blank">Homepage</a> - <a href="https://wpscan.io/" title="wpscan.io" target="_blank">WPScan.io</a> - <a href="https://wpvulndb.com/" title="vulnerability database" target="_blank">Vulnerability Database</a> - <a href="https://wordpress.org/plugins/wpscan/" title="wordpress security plugin" target="_blank">WordPress Security Plugin</a>
13+
<a href="https://wpscan.com/" title="homepage" target="_blank">WPScan WordPress Vulnerability Database</a> - <a href="https://wordpress.org/plugins/wpscan/" title="wordpress security plugin" target="_blank">WordPress Security Plugin</a>
1414
</p>
1515

1616
<p align="center">
@@ -82,7 +82,7 @@ The DB is located at ~/.wpscan/db
8282

8383
## Vulnerability Database
8484

85-
The WPScan CLI tool uses the [WPVulnDB API](https://wpvulndb.com/api) to retrieve WordPress vulnerability data in real time. For WPScan to retrieve the vulnerability data an API token must be supplied via the `--api-token` option, or via a configuration file, as discussed below. An API token can be obtained by registering an account on [WPVulnDB](https://wpvulndb.com/users/sign_up). Up to 50 API requests per day are given free of charge to registered users. Once the 50 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data. Users can upgrade to paid API usage to increase their API limits within their user profile on [WPVulnDB](https://wpvulndb.com/).
85+
The WPScan CLI tool uses the [WPScan API](https://wpscan.com/api) to retrieve WordPress vulnerability data in real time. For WPScan to retrieve the vulnerability data an API token must be supplied via the `--api-token` option, or via a configuration file, as discussed below. An API token can be obtained by registering an account on [WPScan](https://wpscam.com/register). Up to 50 API requests per day are given free of charge to registered users. Once the 50 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data. Users can upgrade to paid API usage to increase their API limits within their user profile on [WPScan](https://wpscan.com/).
8686

8787
## Load CLI options from file/s
8888

app/views/cli/vuln_api/status.erb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,5 +9,5 @@
99
<% end -%>
1010
<% else -%>
1111
<%= warning_icon %> No WPVulnDB API Token given, as a result vulnerability data has not been output.
12-
<%= warning_icon %> You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
12+
<%= warning_icon %> You can get a free API token with 50 daily requests by registering at https://wpscan.com/register
1313
<% end -%>

app/views/json/vuln_api/status.erb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@
88
"requests_remaining": <%= @status['requests_remaining'].to_json %>
99
<% end -%>
1010
<% else -%>
11-
"error": "No WPVulnDB API Token given, as a result vulnerability data has not been output.\nYou can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up"
11+
"error": "No WPVulnDB API Token given, as a result vulnerability data has not been output.\nYou can get a free API token with 50 daily requests by registering at https://wpscan.com/register"
1212
<% end -%>
1313
},

lib/wpscan/db/vuln_api.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class << self
1212

1313
# @return [ Addressable::URI ]
1414
def self.uri
15-
@uri ||= Addressable::URI.parse('https://wpvulndb.com/api/v3/')
15+
@uri ||= Addressable::URI.parse('https://wpscan.com/api/v3/')
1616
end
1717

1818
# @param [ String ] path

lib/wpscan/references.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def wpvulndb_urls
2727
end
2828

2929
def wpvulndb_url(id)
30-
"https://wpvulndb.com/vulnerabilities/#{id}"
30+
"https://wpscan.com/vulnerabilities/#{id}"
3131
end
3232
end
3333
end

spec/output/main_theme/vulnerable.cli_no_colour

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
|
1818
| [!] Title: Dignitas 1.1.9 - Privilage Escalation
1919
| References:
20-
| - https://wpvulndb.com/vulnerabilities/7825
20+
| - https://wpscan.com/vulnerabilities/7825
2121
| - http://research.evex.pw/?vuln=6
2222
| - https://packetstormsecurity.com/files/130652/
2323
|
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
2-
[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
2+
[!] You can get a free API token with 50 daily requests by registering at https://wpscan.com/register

spec/output/vuln_api/no_token.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
22
"vuln_api": {
3-
"error": "No WPVulnDB API Token given, as a result vulnerability data has not been output.\nYou can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up"
3+
"error": "No WPVulnDB API Token given, as a result vulnerability data has not been output.\nYou can get a free API token with 50 daily requests by registering at https://wpscan.com/register"
44
}
55
}

spec/output/wp_version/with_vulns.cli_no_colour

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@
55
|
66
| [!] Title: WP 3.8.1 - Vuln 1
77
| CVSS: 5.4 (VECTOR)
8-
| Reference: https://wpvulndb.com/vulnerabilities/1
8+
| Reference: https://wpscan.com/vulnerabilities/1
99
|
1010
| [!] Title: WP 3.8.1 - Vuln 2
1111
| Fixed in: 3.8.2
1212
| References:
13-
| - https://wpvulndb.com/vulnerabilities/2
13+
| - https://wpscan.com/vulnerabilities/2
1414
| - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0166
1515
| - url-2
1616
| - url-3

spec/shared_examples/references.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@
3333
its(:cve_urls) { should eql %w[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11] }
3434

3535
its(:wpvulndb_ids) { should eql %w[12] }
36-
its(:wpvulndb_urls) { should eql %w[https://wpvulndb.com/vulnerabilities/12] }
36+
its(:wpvulndb_urls) { should eql %w[https://wpscan.com/vulnerabilities/12] }
3737

3838
its(:references_urls) do
3939
should eql [
40-
'https://wpvulndb.com/vulnerabilities/12',
40+
'https://wpscan.com/vulnerabilities/12',
4141
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11'
4242
]
4343
end

0 commit comments

Comments
 (0)