Releases: prestascan/prestascansecurity
Releases · prestascan/prestascansecurity
v1.1.9
v1.1.8
- Fix module connection error.
- Fix some translations.
- Allow user to change monitored website.
v1.1.7
- New logos
- Improved some translations
- Added missing translations
- Fix issues:
- Logos not displaying correctly.
- The number of vulnerabilities by criticality type when hiding and reopening a core vulnerability.
v1.1.6
- Introducing core vulnerabilities alerts: When a new vulnerability is detected in the core of PrestaShop, an alert is sent to the module.
- Introducing automatic scans: Daily automatic scans are performed, and a weekly report email is sent to paying subscribers.
- Improve webhook communication: Better management of errors.
- Fix issues:
- The message "One of your scans appears to be taking longer than expected..." is now displayed only when required. A logic of "last retrieve date" has been added.
- Logging out/resetting the module will now update the new webhook token to the server.
- A database table (
prestascan_vuln_alerts
) was not appropriately deleted when uninstalling/resetting the module. - Fix translation issues for alerts.
- Fix missing vulnerability types.
- Manage new format of alerts.
- Additional improvements:
- Some additional PSR/addons validation.
- New logo.
v1.1.5
- Fix an issue for file download functionality
- Fix an issue dismissing vulnerability alerts when logged out
v1.1.4
- Fix an issue with user profil request
- Force CSS refresh in BackOffice after module upgrade
v1.1.3
- Ability to dismiss results from scans (hide modules, hide CVE, etc..)
- Ability to download results from scans (more data will be added in the report in the future)
- Add the addons URL in the list of modules to update
- Add module URL for vulnerable modules
- Detect SQL Managers directories during directory scans
- Display PrestaScan email linked to current instance
- Few display and functional fixes + code review
v1.1.2
- Display alerts in BackOffice only when the version of the module is impacted by the vulnerability
- Add ability to customize links for contact-us page (for agencies)
- Improve visibility of CVE's authors
- Support of PrestaShop 1.5
- Improve version comparison for modules
- Fix two notice messages
v1.1.1
- Spanish translations (@prestaalba)
- Code review (delete sample data)
- Fix oauth2 login since change in server side + compatibility PS 1.6.0 with oauth2
v1.1.0
This release is the first public stable version that includes multiple fixes and improvements. Additionally, it adds new features based on the feedback received from the previous RC version 1.0 test group.
- Add the ability to cancel a scan
- Improvement of registration system (The user is redirected to its BackOffice)
- Better management of webhook errors
- Updates are checked from the Dashboard
- Add locks to avoid useless API calls and possible errors during reports
- Add warnings before updating, uninstalling or removing a module
- Fix licence headers
- Few CSS adjustments
- Improve french translations
- Multiple bug fixes
- Add support for virtuel shop URLs
- Fix truncated core vulnerability description
- Fix an issue where translations are not applied from the AdminController
- Issue where the alert banner is not displayed correctly in some specific context
- The module update is not triggering update scripts