[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] New Open Source Web Application Vulnerability Scanner Available
- To: Daniel Hadfield <dan@xxxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] New Open Source Web Application Vulnerability Scanner Available
- From: Dermot Blair <webvulscan@xxxxxxxxx>
- Date: Fri, 18 May 2012 15:18:03 +0100
Hi Dan,
Thanks for the feedback. Yes some users seem to be having this problem. The
code works in some environments but not in others.
I will be making another release shortly and will fix the issue. I may have
to make different releases for different environment (Windows, Linux, etc.)
instead of just having the one release.
Kind Regards,
Dermot Blair
On Thu, May 17, 2012 at 3:43 PM, Daniel Hadfield <dan@xxxxxxxxxxxxxxx>wrote:
> The code is broken,
>
> All pages have a require_once() that references a static path.
>
> require_once('/scanner/functions/databaseFunctions.php');
>
> This needs to be
>
> require_once('./scanner/functions/databaseFunctions.php');
>
> Dan
>
> On Thu, May 17, 2012 at 12:48 AM, Dermot Blair <webvulscan@xxxxxxxxx>wrote:
>
>> Hi All,
>>
>>
>>
>> There is a new web application vulnerability scanner available. It is
>> called WebVulScan and it is open source. Here is the link for it if you
>> want to check it out: http://code.google.com/p/webvulscan/
>>
>>
>>
>> Regards,
>>
>>
>>
>> Dermot Blair
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/