Exploit Scanner - Version 0.3

Version Description

Download this release

Release Info

Developer donncha
Plugin Icon wp plugin Exploit Scanner
Version 0.3
Comparing to
See all releases

Code changes from version 0.2 to 0.3

Files changed (2) hide show
  1. exploit-scanner.php +7 -9
  2. readme.txt +3 -1
exploit-scanner.php CHANGED
@@ -3,16 +3,13 @@
3
  Plugin Name: WordPress Exploit Scanner
4
  Plugin URI: http://ocaoimh.ie/exploit-scanner/
5
  Description: Scans your WordPress site for possible exploits
6
- Version: 0.2
7
  Author: Donncha O Caoimh
8
  Author URI: http://ocaoimh.ie/
9
  */
10
 
11
  function exploit_init() {
12
- global $md5_list;
13
  add_action('admin_menu', 'exploit_config_page');
14
- if( is_admin() )
15
- include_once( WP_PLUGIN_DIR . '/exploit-scanner/md5list.php' );
16
  }
17
  add_action('init', 'exploit_init');
18
 
@@ -23,7 +20,7 @@ function exploit_config_page() {
23
  }
24
 
25
  function exploit_admin_page() {
26
- global $suspicious_files, $md5_list, $wpdb, $wp_db_version;
27
  if( !current_user_can( 'manage_options' ) )
28
  wp_die( 'Not allowed here!' );
29
  ?><div class="wrap">
@@ -73,8 +70,9 @@ function exploit_admin_page() {
73
  }
74
 
75
  function search_install( $directory, $text ) {
76
- global $suspicious_files, $md5_list, $modified_core_files;
77
  set_time_limit( 60 );
 
78
 
79
  if(is_dir($directory)) {
80
  $directory = trailingslashit( $directory );
@@ -120,10 +118,10 @@ function hilight_text( $contents, $text ) {
120
  }
121
 
122
  function file_search( $suspect_text = '' ) {
123
- global $suspicious_files, $md5_list, $wpdb, $wp_db_version, $modified_core_files;
124
 
125
- if ( (int) @ini_get('memory_limit') < 64 )
126
- @ini_set( 'memory_limit', '64MB' ); // increase the memory limit if possible, to avoid out of memory errors
127
  $suspicious_files = array();
128
  if( $suspect_text == '' )
129
  $suspect_text = array( "iframe src" => "iframes can sometimes be used by hackers to load their own adverts and code on your site.",
3
  Plugin Name: WordPress Exploit Scanner
4
  Plugin URI: http://ocaoimh.ie/exploit-scanner/
5
  Description: Scans your WordPress site for possible exploits
6
+ Version: 0.3
7
  Author: Donncha O Caoimh
8
  Author URI: http://ocaoimh.ie/
9
  */
10
 
11
  function exploit_init() {
 
12
  add_action('admin_menu', 'exploit_config_page');
 
 
13
  }
14
  add_action('init', 'exploit_init');
15
 
20
  }
21
 
22
  function exploit_admin_page() {
23
+ global $suspicious_files, $wpdb, $wp_db_version;
24
  if( !current_user_can( 'manage_options' ) )
25
  wp_die( 'Not allowed here!' );
26
  ?><div class="wrap">
70
  }
71
 
72
  function search_install( $directory, $text ) {
73
+ global $suspicious_files, $modified_core_files;
74
  set_time_limit( 60 );
75
+ include_once( WP_PLUGIN_DIR . '/exploit-scanner/md5list.php' );
76
 
77
  if(is_dir($directory)) {
78
  $directory = trailingslashit( $directory );
118
  }
119
 
120
  function file_search( $suspect_text = '' ) {
121
+ global $suspicious_files, $wpdb, $wp_db_version, $modified_core_files;
122
 
123
+ if ( (int) @ini_get('memory_limit') < 128 )
124
+ @ini_set( 'memory_limit', '128M' ); // increase the memory limit if possible, to avoid out of memory errors
125
  $suspicious_files = array();
126
  if( $suspect_text == '' )
127
  $suspect_text = array( "iframe src" => "iframes can sometimes be used by hackers to load their own adverts and code on your site.",
readme.txt CHANGED
@@ -2,7 +2,7 @@
2
  Contributors: donncha
3
  Tags: hacking, spam, hack, crack, exploit, vulnerability
4
  Tested up to: 2.6.3
5
- Stable tag: 0.2
6
  Requires at least: 2.6.3
7
 
8
  Search the files and database of your WordPress install for malicious code or spammy links left by a hacker.
@@ -13,6 +13,8 @@ This plugin searches the files on your website, and the posts and comments table
13
  It does not remove anything. That is left to the user to do.
14
 
15
  MD5 for version 0.1: 6a88a18a37c4add7dabd72fc97be13b6
 
 
16
 
17
  See the [WordPress Exploit Scanner homepage](http://ocaoimh.ie/exploit-scanner/) for further information.
18
 
2
  Contributors: donncha
3
  Tags: hacking, spam, hack, crack, exploit, vulnerability
4
  Tested up to: 2.6.3
5
+ Stable tag: 0.3
6
  Requires at least: 2.6.3
7
 
8
  Search the files and database of your WordPress install for malicious code or spammy links left by a hacker.
13
  It does not remove anything. That is left to the user to do.
14
 
15
  MD5 for version 0.1: 6a88a18a37c4add7dabd72fc97be13b6
16
+ MD5 for version 0.2: 48dd892fb9c41899af14e9cf94ec7ea8
17
+ MD5 for version 0.3: 44cc8a46861f18698789357fa2fc7e60
18
 
19
  See the [WordPress Exploit Scanner homepage](http://ocaoimh.ie/exploit-scanner/) for further information.
20