class _CoreFindingNoVersion(_CoreFinding): (source)
Known subclasses: wpscan_out_parse.parser.components.ConfigBackup
, wpscan_out_parse.parser.components.DBExport
, wpscan_out_parse.parser.components.NotFullyConfigured
, wpscan_out_parse.parser.components.PasswordAttack
Method | get_version |
Returns empty string |
Method | get_version_status |
Returns empty string |
Method | get_vulnerabilities_string |
Returns empty string |
Inherited from _CoreFinding
:
Method | get_name |
Return the name of the finding. |
Method | get_status |
Return a string in : "Alert", "Warning", "Ok", "Ok (false positive)" or "Unknown" |
Method | component_is_false_positive |
Return true if all alerts and warnings of the component are ignored by false positives strings. Return false if it's not a false positive or if there is no alerts or warnings. Does not work for parser objects because they process false positives. |
Inherited from Finding
(via _CoreFinding
):
Method | __init__ |
From https://github.com/wpscanteam/wpscan/blob/master/app/views/json/finding.erb |
Instance Variable | found_by |
Undocumented |
Instance Variable | confidence |
Undocumented |
Instance Variable | interesting_entries |
Undocumented |
Instance Variable | confirmed_by |
Undocumented |
Instance Variable | vulnerabilities |
Undocumented |
Instance Variable | references |
Undocumented |
Method | get_alerts |
Return list of vulnerabilities |
Method | get_infos |
Return 1 info, only interesting entries. If no interesting entries: return an empty info string (to avoid errors) |
Method | get_references_str |
Process CVE, WPVulnDB, ExploitDB and Metasploit references to add links |
Inherited from Component
(via _CoreFinding
, Finding
):
Instance Variable | data |
Initial data. |
Instance Variable | false_positives_strings |
Undocumented |
Instance Variable | show_all_details |
Undocumented |
Method | is_false_positive |
False Positive Detection |
Method | get_warnings |
Return the component warnings as a list of strings. |