class _CoreFindingNoVersion(_CoreFinding): (source)
Known subclasses: wpscan_out_parse.parser.components.ConfigBackup, wpscan_out_parse.parser.components.DBExport, wpscan_out_parse.parser.components.NotFullyConfigured, wpscan_out_parse.parser.components.PasswordAttack
| Method | get_version |
Returns empty string |
| Method | get_version_status |
Returns empty string |
| Method | get_vulnerabilities_string |
Returns empty string |
Inherited from _CoreFinding:
| Method | get_name |
Return the name of the finding. |
| Method | get_status |
Return a string in : "Alert", "Warning", "Ok", "Ok (false positive)" or "Unknown" |
| Method | component_is_false_positive |
Return true if all alerts and warnings of the component are ignored by false positives strings. Return false if it's not a false positive or if there is no alerts or warnings. Does not work for parser objects because they process false positives. |
Inherited from Finding (via _CoreFinding):
| Method | __init__ |
From https://github.com/wpscanteam/wpscan/blob/master/app/views/json/finding.erb |
| Instance Variable | found_by |
Undocumented |
| Instance Variable | confidence |
Undocumented |
| Instance Variable | interesting_entries |
Undocumented |
| Instance Variable | confirmed_by |
Undocumented |
| Instance Variable | vulnerabilities |
Undocumented |
| Instance Variable | references |
Undocumented |
| Method | get_alerts |
Return list of vulnerabilities |
| Method | get_infos |
Return 1 info, only interesting entries. If no interesting entries: return an empty info string (to avoid errors) |
| Method | get_references_str |
Process CVE, WPVulnDB, ExploitDB and Metasploit references to add links |
Inherited from Component (via _CoreFinding, Finding):
| Instance Variable | data |
Initial data. |
| Instance Variable | false_positives_strings |
Undocumented |
| Instance Variable | show_all_details |
Undocumented |
| Method | is_false_positive |
False Positive Detection |
| Method | get_warnings |
Return the component warnings as a list of strings. |