403Webshell
Server IP : 103.119.228.120  /  Your IP : 3.144.86.38
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /home/hendraso/public_html/old/wp-content/plugins/exploit-scanner/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /home/hendraso/public_html/old/wp-content/plugins/exploit-scanner/ChangeLog.txt
2012-10-23 08:29  donncha

	* exploit-scanner.php, readme.txt: Updated version, tested version
	  and changelog notices

2012-10-23 08:24  donncha

	* hashes-3.4.2.php: Added md5 hashes for WordPress 3.4.2

2012-07-01 15:30  duck_

	* readme.txt: Tag version 1.3.1

2012-07-01 15:29  duck_

	* exploit-scanner.php, hashes-3.4.1.php, readme.txt: Add hashes for
	  WordPress 3.4.1.

2012-06-14 19:40  duck_

	* readme.txt: Tag 1.3

2012-06-14 19:38  duck_

	* exploit-scanner.php, hashes-3.4.php, readme.txt: Add hashes for
	  3.4 and prepare for 1.3.

2012-06-14 18:35  duck_

	* exploit-scanner.php: Check for unknown files in the
	  wp-includes/wp-admin directories.

2012-04-20 16:18  duck_

	* exploit-scanner.php, hashes-3.3.2.php, readme.txt: Add WordPress
	  3.3.2 file hashes.

2012-01-06 17:07  duck_

	* exploit-scanner.php, readme.txt: Exploit Scanner version 1.2

2012-01-04 17:12  duck_

	* exploit-scanner.php: Don't save the entire suspicious line too
	  the DB if it's too long.
	  
	  This should help prevent one of the causes of hanging scans:
	  MySQL error 1153 "Got a packet bigger than 'max_allowed_packet'
	  bytes".

2012-01-04 16:13  duck_

	* hashes-3.0.1.php, hashes-3.0.2.php, hashes-3.0.3.php,
	  hashes-3.0.4.php, hashes-3.0.5.php, hashes-3.0.6.php,
	  hashes-3.0.php, hashes-3.1.1.php, hashes-3.1.2.php,
	  hashes-3.1.3.php, hashes-3.1.4.php, hashes-3.1.php,
	  hashes-3.2.1.php, hashes-3.2.php, hashes-3.3.1.php: Add hashes
	  for WordPress 3.3.1. Remove older hashes.

2012-01-04 15:43  duck_

	* exploit-scanner.php: Use 3.3 help tabs. Stops deprecated notice.

2011-12-16 00:15  duck_

	* hashes-3.3.php: Add missing hash file... oops.

2011-12-15 23:41  duck_

	* exploit-scanner.php, readme.txt: One point one.

2011-11-30 14:17  donncha

	* exploit-scanner.php: Added "Scanner Settings" link for the
	  plugins page.

2011-11-20 14:16  duck_

	* exploit-scanner.php: * More permissive TimThumb fix.
	  * Add a couple more potential TimThumb file names.
	  * Fix bug which meant that only files in ABSPATH directory were
	  checked for vulns.

2011-09-25 16:06  duck_

	* exploit-scanner.php: Scan for, and fix old TimThumb scripts.

2011-09-25 12:27  duck_

	* exploit-scanner.php: Detect old export files even if they're
	  larger than the size limit.

2011-07-16 08:01  duck_

	* readme.txt: Tagging 1.0.5.

2011-07-16 07:59  duck_

	* exploit-scanner.php, hashes-3.2.1.php, hashes-3.2.php,
	  readme.txt: 3.2 and 3.2.1 hashes. Prepare for 1.0.5

2011-06-30 12:58  duck_

	* create-md5.sh, exploit-scanner.php, hashes-3.1.4.php, readme.txt:
	  3.1.4 hashes and pattern tweaks. With thanks to mdawaffe and
	  simonwheatley.

2011-05-27 14:32  duck_

	* exploit-scanner.php, hashes-3.1.3.php, readme.txt: Tagging 1.0.3.
	  WordPress 3.1.3 hashes + old export file detection.

2011-05-03 15:25  duck_

	* readme.txt: Bump.

2011-05-03 15:21  duck_

	* exploit-scanner.php, hashes-3.0.6.php, hashes-3.1.2.php,
	  readme.txt: Prepare 1.0.2 with new hashes. Remove currently
	  unnecessary branches.

2011-04-05 21:26  duck_

	* readme.txt: Bump.

2011-04-05 21:21  duck_

	* exploit-scanner.php, hashes-3.1.1.php, readme.txt: Add 3.1.1
	  hashes. Tag 1.0.1

2011-02-27 18:29  duck_

	* readme.txt: Bump.

2011-02-27 18:26  duck_

	* exploit-scanner.php, readme.txt: Bring back post scan
	  auto-reloading.

2011-02-27 18:14  duck_

	* exploit-scanner.php, readme.txt: Better safe than sorry. Remove
	  create-md5 script for release.

2011-02-27 17:38  duck_

	* exploit-scanner.php, readme.txt: Prepare for 1.0

2011-02-24 19:38  duck_

	* exploit-scanner.php: More debugging code

2011-02-24 12:11  duck_

	* exploit-scanner.php: Basic docs. parseInt( num, 10 ), merci
	  beaucoup koopersmith. Fatal error as late as possible

2011-02-24 09:42  duck_

	* exploit-scanner.php, hashes-2.9.1.php, hashes-2.9.2.php,
	  hashes-2.9.php: Disable unescape pattern, too many FPs.
	  json_encode error output

2011-02-24 09:38  duck_

	* hashes-3.1.php: Add 3.1 hashes. Remove 2.9.x hashes.

2011-02-08 19:14  duck_

	* readme.txt: readme bump

2011-02-08 00:15  duck_

	* readme.txt: Tag 0.97.6

2011-02-07 23:59  duck_

	* hashes-3.0.5.php, readme.txt: 3.0.5 hashes

2011-01-06 15:30  duck_

	* exploit-scanner.php: Bump

2011-01-06 15:23  duck_

	* exploit-scanner.php: Debugging for array_splice issue

2011-01-05 17:53  duck_

	* readme.txt: Link to German hashes

2010-12-30 00:20  duck_

	* hashes-3.0.4.php, readme.txt: WordPress 3.0.4 released today...

2010-12-08 19:42  duck_

	* readme.txt: missing = in readme

2010-12-08 19:40  duck_

	* hashes-3.0.3.php, readme.txt: 3.0.3 compat

2010-12-04 17:56  duck_

	* readme.txt: revert readme

2010-12-04 17:51  duck_

	* exploit-scanner.php, readme.txt: Update routine. Fix diff cache.

2010-12-04 15:09  duck_

	* exploit-scanner.php: Thickbox loading of file diffs, do not
	  delete partial results on construct!

2010-12-03 22:08  duck_

	* exploit-scanner.php: Fix notice for users without manage_options,
	  add some patterns

2010-12-01 15:11  duck_

	* exploit-scanner.php: Oops! Move $wp_version

2010-12-01 14:23  duck_

	* exploit-scanner.php: Split up admin display, non-js file diffs

2010-12-01 00:18  duck_

	* exploit-scanner.php, hashes-3.0.2.php, readme.txt: three dot zero
	  dot two

2010-09-22 15:46  duck_

	* exploit-scanner.php: Simplify patterns, move JS, trim trailing

2010-09-13 22:04  duck_

	* exploit-scanner.php, loader.gif: Modified files diff view first
	  pass. Fix loader.gif bg colour

2010-07-29 22:19  duck_

	* hashes-3.0.1.php, readme.txt: fix hashes w.r.t core ticket #14454

2010-07-29 21:51  duck_

	* exploit-scanner.php, readme.txt: 0.97.2

2010-07-29 21:32  duck_

	* hashes-3.0.1.php: 3.0.1 hashes

2010-07-21 16:17  duck_

	* exploit-scanner.php, readme.txt: PHP 4 compat (for now)

2010-07-20 21:19  duck_

	* readme.txt: 0.97

2010-07-20 21:17  duck_

	* exploit-scanner.php, hashes-2.7.1.php, hashes-2.7.php,
	  hashes-2.8.1.php, hashes-2.8.2.php, hashes-2.8.3.php,
	  hashes-2.8.4.php, hashes-2.8.5.php, hashes-2.8.6.php,
	  hashes-2.8.php, readme.txt: prep for 0.97

2010-07-19 23:11  duck_

	* exploit-scanner.php: DB clean up on activate

2010-07-19 22:05  duck_

	* exploit-scanner.php, readme.txt: minor adjustments

2010-07-19 21:42  duck_

	* exploit-scanner.php: switch 0.97 to trunk

2010-07-13 18:52  duck_

	* exploit-scanner.php, readme.txt: Tagging 0.96

2010-07-13 17:04  duck_

	* hashes-3.0.php: Add 3.0 hashes

2010-02-19 16:36  donncha

	* readme.txt: Thanks Thorsten

2010-02-19 16:25  donncha

	* readme.txt: Added Upgrade notice and changelog

2010-02-19 16:02  donncha

	* readme.txt: Bump version to 0.95 and add new md5 hashes

2010-02-19 15:54  donncha

	* exploit-scanner.php: Bump version to 0.95

2010-02-19 14:27  donncha

	* exploit-scanner.php: * Only show "general infos" scan to non MU
	  sites as it's expensive on big MU sites.
	  * Display "General Infos" and "serverinfo" results

2010-02-19 13:05  donncha

	* exploit-scanner.php: Make "display:none" a blocker instead of an
	  exploit

2010-02-18 16:57  donncha

	* exploit-scanner.php: Make Javascript a blocker, not an exploit

2010-02-18 13:23  donncha

	* exploit-scanner.php: Rearrange the scan results for easier
	  reading

2010-02-18 11:43  donncha

	* exploit-scanner.php: Added "Exploit" scan level

2010-02-17 15:11  donncha

	* hashes-2.9.2.php: Added hashes for 2.9.2

2010-02-17 15:10  donncha

	* hashes-2.9.1.php: Fixed hashes for 2.9.1

2010-02-17 15:08  donncha

	* create-md5.sh: Make sure a directory is specified on the command
	  line

2010-02-17 14:18  donncha

	* exploit-scanner.php: * Use GET instead of POST, useful to restart
	  a stalled scan.
	  * Page the scan, 50 files at a time.

2010-02-02 17:20  donncha

	* exploit-scanner.php, readme.txt: Bump version number to 0.94 and
	  md5 hashes

2010-02-02 17:02  donncha

	* exploit-scanner.php: Re-org exploit form.

2010-02-02 15:09  donncha

	* exploit-scanner.php: Remove "skip checks" and reorganise
	  checkboxes

2010-01-13 16:04  donncha

	* hashes-2.9.1.php: Added hash file for WP 2.9.1

2010-01-13 15:02  donncha

	* create-md5.sh: Rename md5 -> md5sum and fix last CR

2010-01-13 14:22  donncha

	* exploit-scanner.php: Only load jquery-form on admin page, props
	  Matt Walters

2009-12-18 23:41  ryan

	* exploit-scanner.php, hashes-2.9.php, readme.txt: 2.9 support

2009-12-14 12:26  tott

	* exploit-scanner.php, readme.txt: increasing version number, grmpf

2009-12-14 11:45  tott

	* readme.txt: fixing an error i did not see due to error reporting
	  settings

2009-12-14 11:41  tott

	* readme.txt: fixing an error i did not see due to error reporting
	  settings

2009-12-14 11:40  tott

	* exploit-scanner.php: fixing an error i did not see due to error
	  reporting settings

2009-12-14 11:18  tott

	* exploit-scanner.php, readme.txt: Some speed optimization - skip
	  unwanted checks instead of hiding them

2009-12-14 10:22  tott

	* exploit-scanner.php, readme.txt: Added pattern for GNU GPL
	  JavaScript attack. Disables Ajax for now due to some
	  compatibility issues. Can be enabled by uncommenting lines 1145,
	  1146

2009-11-26 18:14  tott

	* exploit-scanner.php: various improvements for running the script
	  without ajax

2009-11-26 15:38  donncha

	* exploit-scanner.php: Disable the AJAX submit button

2009-11-26 14:51  donncha

	* exploit-scanner.php: load jquery-form from a wp_print_scripts
	  action

2009-11-26 14:50  donncha

	* exploit-scanner.php: Style and indenation fixes

2009-11-24 16:22  tott

	* exploit-scanner.php: Adding possibility to skip file permission
	  check as it seems it's not applicable for most hosting companies

2009-11-12 21:10  ryan

	* readme.txt: Add tott

2009-11-12 19:58  ryan

	* readme.txt: 0.7

2009-11-12 18:21  ryan

	* readme.txt: Update hash

2009-11-12 18:20  ryan

	* exploit-scanner.php: Drop the NG

2009-11-12 18:16  ryan

	* readme.txt: Update hashes

2009-11-12 18:11  ryan

	* hashes-2.8.6.php: Add 2.8.6 hashes

2009-11-11 21:54  tott

	* create-md5.sh, exploit-scanner.php: Complete refactoring of the
	  code which includes the following improvements / changes
	  - encapsulation of all scan functions in class
	  - clear definition of restricted commands, patterns, and
	  whitelist patterns
	  - extended ruleset and added severities for incidents found
	  - filesystem permission check added
	  - output of various php / mysql variables added
	  - added possibility to choose scan groups to execute and severity
	  levels to display
	  - running the scan via ajax for better usability
	  - improved output with table layout

2009-11-04 10:34  donncha

	* exploit-scanner.php, readme.txt: Bump version to 0.6 and updated
	  docs

2009-11-04 10:03  donncha

	* exploit-scanner.php: Minor text change

2009-10-25 10:41  donncha

	* exploit-scanner.php: Don't show md5 of hashes file if it doesn't
	  exist.

2009-10-25 09:39  donncha

	* exploit-scanner.php: Set php memory limit or max file size from
	  plugin admin page.

2009-10-24 17:05  donncha

	* exploit-scanner.php: Skip files larger than 400K

2009-10-21 09:26  donncha

	* readme.txt: Minor update to install docs, props Richard Hearne

2009-10-20 22:29  ryan

	* readme.txt: 0.5

2009-10-20 22:26  ryan

	* exploit-scanner.php, readme.txt: Correct hashes file name. Update
	  MD5s.

2009-10-20 22:22  ryan

	* readme.txt: Add hashes for 0.4 and 0.5

2009-10-20 22:18  ryan

	* exploit-scanner.php, hashes-2.7.1.php, hashes-2.7.php,
	  hashes-2.8.1.php, hashes-2.8.2.php, hashes-2.8.3.php,
	  hashes-2.8.4.php, hashes-2.8.5.php, hashes-2.8.php, readme.txt:
	  Add hashes for 2.8.5

2009-10-20 16:58  donncha

	* readme.txt: Added "out of memory" FAQ

2009-10-20 16:02  ryan

	* create-md5.sh: Update to match hash file format

2009-10-20 15:42  ryan

	* exploit-scanner.php: Add hooray for settings

2009-10-20 15:27  donncha

	* exploit-scanner.php, hashes-2.7.1.php, hashes-2.7.1.txt,
	  hashes-2.7.php, hashes-2.7.txt, hashes-2.8.1.php,
	  hashes-2.8.1.txt, hashes-2.8.2.php, hashes-2.8.2.txt,
	  hashes-2.8.3.php, hashes-2.8.3.txt, hashes-2.8.4.php,
	  hashes-2.8.4.txt, hashes-2.8.php, hashes-2.8.txt: Load hash file
	  from outside recursive loop and put hashes into php files

2009-10-19 19:26  ryan

	* readme.txt: Update contribs and tested ver.

2009-10-19 19:20  ryan

	* exploit-scanner.php: Scan options

2009-10-19 18:42  donncha

	* create-md5.sh: Added Bash script to generate md5 array

2009-09-23 15:50  duck_

	* exploit-scanner.php, hashes-2.7.1.txt, hashes-2.7.txt,
	  hashes-2.8.1.txt, hashes-2.8.2.txt, hashes-2.8.3.txt,
	  hashes-2.8.4.txt, hashes-2.8.txt, loader.gif, md5list.php,
	  readme.txt: 0.5 development version

2009-04-18 22:26  donncha

	* exploit-scanner.php, readme.txt: Updated version number and
	  tested to version

2009-04-18 22:16  donncha

	* md5list.php: Updated md5list for 2.7.1

2009-04-18 22:11  donncha

	* readme.txt: Added donation link

2008-11-20 20:37  donncha

	* readme.txt: Added MD5s for 0.2 and 0.3

2008-11-20 20:35  donncha

	* exploit-scanner.php, readme.txt: Bump to version 0.3 to fix
	  memory limit typo

2008-11-20 20:31  donncha

	* exploit-scanner.php: Fixed MB typo.
	  Increased memory limit to 128M, just in case

2008-11-20 20:22  donncha

	* exploit-scanner.php: md5 list is only needed in search_install(),
	  after memory limit is increased!

2008-11-20 17:37  donncha

	* exploit-scanner.php, readme.txt: Bump version number to 0.2

2008-11-20 17:23  donncha

	* exploit-scanner.php, md5list.php, readme.txt: Added list of md5
	  values for the files in WordPress 2.6.3:
	  1. Use md5 list to remove false positives
	  2. Warn if core WordPress files have been modified.
	  Added several more possible exploit strings

2008-06-28 09:55  donncha

	* exploit-scanner.php: Don't die on older versions. Just warn.
	  Increase the memory limit to 64MB if possible. May fix out of
	  memory errors for some people.
	  Increase timeout of loading refresh and flush content to browser
	  so it appears.

2008-06-26 17:37  donncha

	* exploit-scanner.php, readme.txt: Initial import

2008-06-26 15:09  plugin-master

	* .: adding exploit-scanner by donncha


Youez - 2016 - github.com/yon3zu
LinuXploit