diff --git a/README.md b/README.md index 4f8dbf5..4585be2 100644 --- a/README.md +++ b/README.md @@ -278,7 +278,7 @@ Finds all vulnerabilities for a given URI: ```ruby require 'ronin/vulns/core_ext' -URI('https://example.com/page.php?lang=en').vulns +URI('http://testphp.vulnweb.com/listproducts.php?cat=1').vulns # => [#, ...] ``` @@ -286,7 +286,7 @@ URI('https://example.com/page.php?lang=en').vulns Check if a URI contains any vulnerabilities: ```ruby -URI('https://example.com/page.php?lang=en').has_vulns? +URI('http://testphp.vulnweb.com/listproducts.php?cat=1').has_vulns? # => true ``` diff --git a/lib/ronin/vulns/core_ext/uri/http.rb b/lib/ronin/vulns/core_ext/uri/http.rb index ed5bb77..13b8c91 100644 --- a/lib/ronin/vulns/core_ext/uri/http.rb +++ b/lib/ronin/vulns/core_ext/uri/http.rb @@ -42,7 +42,7 @@ class HTTP # All discovered Web vulnerabilities # # @example - # URI('https://testphp.vulnweb.com/').vulns + # URI('http://testphp.vulnweb.com/listproducts.php?cat=1').vulns # # => [#, ...] # # @see Ronin::Vulns::URLScanner.scan @@ -63,7 +63,7 @@ def vulns(**kwargs) # @return [Boolean] # # @example - # URI('https://testphp.vulnweb.com/').has_vulns? + # URI('http://testphp.vulnweb.com/listproducts.php?cat=1').has_vulns? # # => true # # @see Ronin::Vulns::URLScanner.test