Linux 软件免费装
Banner图

WPVulnerability

开发者 closetechnology
davidperez
javiercasares
lbonomo
alexclassroom
更新时间 2024年10月28日 16:22
PHP版本: 5.6 及以上
WordPress版本: 6.7
版权: GPL-2.0-or-later
版权网址: 版权信息

标签

security site-health vulnerability

下载

1.3.1 3.4.0 4.0.0 4.0.1 2.0.3 1.2.1 1.3.0 3.4.1 4.0.2 4.0.3 3.3.3 3.3.5 3.3.4 1.1 1.2.3 1.3.2 2.0.2 2.0.4 0.2 1.0.1 1.2.0 1.3.3 2.0.0 2.0.1 0.1 1.2.2 2.2.1 3.0.1 2.1.0 2.2.0 3.0.2 3.1.0 3.1.2 3.2.0 1.2.4 3.0.0 3.1.1 3.2.2 3.3.0 1.0 3.3.1 3.3.2

详情介绍:

This plugin integrates with the WPVulnerability API to provide real-time vulnerability assessments for your WordPress core, plugins, themes, PHP version, Apache HTTPD, nginx, MariaDB, MySQL, ImageMagick, curl, memcached, Redis, and SQLite. It delivers detailed reports directly within your WordPress dashboard, helping you stay aware of potential security risks. Configure the plugin to send periodic notifications about your site's security status, ensuring you remain informed without being overwhelmed. Designed for ease of use, it supports proactive security measures without storing or retrieving any personal data from your site. Data reliability The information provided by the information database comes from different sources that have been reviewed by third parties. There is no liability of any kind for the information. Act at your own risk.

安装:

Automatic download Visit the plugin section in your WordPress, search for [wpvulnerability]; download and install the plugin. Manual download Extract the contents of the ZIP and upload the contents to the /wp-content/plugins/wpvulnerability/ directory. Once uploaded, it will appear in your plugin list.

屏幕截图:

  • Vulnerability list at Plugins list.
  • Vulnerability list at Site Health.

常见问题:

Where does the vulnerability information come from?

The origin is in the WPVulnerability.com API. The vulnerabilities that appear in this API come from different sources, such as CVEs.

Is data from my site sent anywhere?

No. Never. Your privacy is very important to us. We do not commercialize with your data.

What vulnerabilities will I find?

Vulnerabilities in WordPress Core, Plugins, Themes, PHP, Apache HTTPD, nginx, MariaDB, MySQL, ImageMagick, curl, memcached, Redis, and SQLite are documented.

What do I do if my site has a vulnerability?

First of all, peace of mind. Investigate what the vulnerability is and, above all, check that you have the latest version of the compromised element. We actively recommend that you keep all your WordPress and its plugins up to date. Contact your hosting provider to patch non-WordPress vulnerabilities (like web server, databases, and other software).

更新日志:

[4.0.3] - 2024-10-28 [4.0.2] - 2024-10-25 Fixed Compatibility Tests [4.0.1] - 2024-10-04 Fixed Compatibility Tests [4.0.0] - 2024-10-01 Added Fixed Changed Compatibility Tests Previous versions If you want to see the full changelog, visit the changelog.txt file.