Exploit Scanner - Version 0.91

Version Description

Download this release

Release Info

Developer tott
Plugin Icon wp plugin Exploit Scanner
Version 0.91
Comparing to
See all releases

Code changes from version 0.9 to 0.91

Files changed (2) hide show
  1. exploit-scanner.php +3 -3
  2. readme.txt +2 -1
exploit-scanner.php CHANGED
@@ -338,7 +338,7 @@ class Exploit_Scanner {
338
  function prepare_patterns() {
339
  if ( ! empty( $this->restricted_patterns ) ) {
340
  foreach ( $this->restricted_patterns as $pattern => $data ) {
341
- if ( !in_array( strtolower( $data['level'] ), $scanner->display_severities ) )
342
  continue;
343
  $this->_prepared_patterns[] = $pattern;
344
  $this->_pattern_descriptions[ $pattern ] = $data;
@@ -346,7 +346,7 @@ class Exploit_Scanner {
346
  }
347
  if ( ! empty( $this->whitelist_patterns ) ) {
348
  foreach ( $this->whitelist_patterns as $pattern => $data ) {
349
- if ( !in_array( strtolower( $data['level'] ), $scanner->display_severities ) )
350
  continue;
351
  $this->_prepared_patterns[] = $pattern;
352
  $this->_pattern_descriptions[ $pattern ] = $data;
@@ -355,7 +355,7 @@ class Exploit_Scanner {
355
 
356
  if ( ! empty( $this->restricted_commands ) ) {
357
  foreach ( $this->restricted_commands as $command => $data) {
358
- if ( !in_array( strtolower( $data['level'] ), $scanner->display_severities ) )
359
  continue;
360
  $cmd_pattern = "/\s+($command)+\s?\(+[\$|\'|\"]+/msiU";
361
  $this->_prepared_patterns[] = $cmd_pattern;
338
  function prepare_patterns() {
339
  if ( ! empty( $this->restricted_patterns ) ) {
340
  foreach ( $this->restricted_patterns as $pattern => $data ) {
341
+ if ( !in_array( strtolower( $data['level'] ), $this->display_severities ) )
342
  continue;
343
  $this->_prepared_patterns[] = $pattern;
344
  $this->_pattern_descriptions[ $pattern ] = $data;
346
  }
347
  if ( ! empty( $this->whitelist_patterns ) ) {
348
  foreach ( $this->whitelist_patterns as $pattern => $data ) {
349
+ if ( !in_array( strtolower( $data['level'] ), $this->display_severities ) )
350
  continue;
351
  $this->_prepared_patterns[] = $pattern;
352
  $this->_pattern_descriptions[ $pattern ] = $data;
355
 
356
  if ( ! empty( $this->restricted_commands ) ) {
357
  foreach ( $this->restricted_commands as $command => $data) {
358
+ if ( !in_array( strtolower( $data['level'] ), $this->display_severities ) )
359
  continue;
360
  $cmd_pattern = "/\s+($command)+\s?\(+[\$|\'|\"]+/msiU";
361
  $this->_prepared_patterns[] = $cmd_pattern;
readme.txt CHANGED
@@ -2,7 +2,7 @@
2
  Contributors: donncha, duck_, ryan, azaozz, tott
3
  Tags: hacking, spam, hack, crack, exploit, vulnerability
4
  Tested up to: 2.8.6
5
- Stable tag: 0.9
6
  Requires at least: 2.7.1
7
  Donate link: http://ocaoimh.ie/wordpress-plugins/gifts-and-donations/
8
 
@@ -13,6 +13,7 @@ This plugin searches the files on your website, and the posts and comments table
13
 
14
  It does not remove anything. That is left to the user to do.
15
 
 
16
  * MD5 for version 0.9: c854cfad74d1a21111864d64600ff415
17
  * MD5 for version 0.8: d06d1f04d3652cafb862756ecc499884
18
  * MD5 for version 0.7: 1d4b6797f10685bd271ebc1ec17b782c
2
  Contributors: donncha, duck_, ryan, azaozz, tott
3
  Tags: hacking, spam, hack, crack, exploit, vulnerability
4
  Tested up to: 2.8.6
5
+ Stable tag: 0.91
6
  Requires at least: 2.7.1
7
  Donate link: http://ocaoimh.ie/wordpress-plugins/gifts-and-donations/
8
 
13
 
14
  It does not remove anything. That is left to the user to do.
15
 
16
+ * MD5 for version 0.91: 7ad2e26b24dffa57331d8514903a06eb
17
  * MD5 for version 0.9: c854cfad74d1a21111864d64600ff415
18
  * MD5 for version 0.8: d06d1f04d3652cafb862756ecc499884
19
  * MD5 for version 0.7: 1d4b6797f10685bd271ebc1ec17b782c