[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAJfrXva12P4FmFM6-Y902cDB1SL6tmgSULikBxbahQtVkBpCtg@mail.gmail.com>
Date: Fri, 18 May 2012 15:18:03 +0100
From: Dermot Blair <webvulscan@...il.com>
To: Daniel Hadfield <dan@...gsweep.co.uk>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: New Open Source Web Application Vulnerability
Scanner Available
Hi Dan,
Thanks for the feedback. Yes some users seem to be having this problem. The
code works in some environments but not in others.
I will be making another release shortly and will fix the issue. I may have
to make different releases for different environment (Windows, Linux, etc.)
instead of just having the one release.
Kind Regards,
Dermot Blair
On Thu, May 17, 2012 at 3:43 PM, Daniel Hadfield <dan@...gsweep.co.uk>wrote:
> The code is broken,
>
> All pages have a require_once() that references a static path.
>
> require_once('/scanner/functions/databaseFunctions.php');
>
> This needs to be
>
> require_once('./scanner/functions/databaseFunctions.php');
>
> Dan
>
> On Thu, May 17, 2012 at 12:48 AM, Dermot Blair <webvulscan@...il.com>wrote:
>
>> Hi All,
>>
>>
>>
>> There is a new web application vulnerability scanner available. It is
>> called WebVulScan and it is open source. Here is the link for it if you
>> want to check it out: http://code.google.com/p/webvulscan/
>>
>>
>>
>> Regards,
>>
>>
>>
>> Dermot Blair
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists