开发者 |
closetechnology
davidperez javiercasares lbonomo alexclassroom |
---|---|
更新时间 | 2024年10月28日 16:22 |
PHP版本: | 5.6 及以上 |
WordPress版本: | 6.7 |
版权: | GPL-2.0-or-later |
版权网址: | 版权信息 |
/wp-content/plugins/wpvulnerability/
directory. Once uploaded, it will appear in your plugin list.The origin is in the WPVulnerability.com API. The vulnerabilities that appear in this API come from different sources, such as CVEs.
No. Never. Your privacy is very important to us. We do not commercialize with your data.
Vulnerabilities in WordPress Core, Plugins, Themes, PHP, Apache HTTPD, nginx, MariaDB, MySQL, ImageMagick, curl, memcached, Redis, and SQLite are documented.
First of all, peace of mind. Investigate what the vulnerability is and, above all, check that you have the latest version of the compromised element. We actively recommend that you keep all your WordPress and its plugins up to date. Contact your hosting provider to patch non-WordPress vulnerabilities (like web server, databases, and other software).