Download the PHP package zae/wp-vulnerabilities without Composer

On this page you can find all versions of the php package zae/wp-vulnerabilities. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.

FAQ

After the download, you have to make one include require_once('vendor/autoload.php');. After that you have to import the classes with use statements.

Example:
If you use only one package a project is not needed. But if you use more then one package, without a project it is not possible to import the classes with use statements.

In general, it is recommended to use always a project to download your libraries. In an application normally there is more than one library needed.
Some PHP packages are not free to download and because of that hosted in private repositories. In this case some credentials are needed to access such packages. Please use the auth.json textarea to insert credentials, if a package is coming from a private repository. You can look here for more information.

  • Some hosting areas are not accessible by a terminal or SSH. Then it is not possible to use Composer.
  • To use Composer is sometimes complicated. Especially for beginners.
  • Composer needs much resources. Sometimes they are not available on a simple webspace.
  • If you are using private repositories you don't need to share your credentials. You can set up everything on our site and then you provide a simple download link to your team member.
  • Simplify your Composer build process. Use our own command line tool to download the vendor folder as binary. This makes your build process faster and you don't need to expose your credentials for private repositories.
Please rate this library. Is it a good library?

Informations about the package wp-vulnerabilities

Wordpress vulnerabilities scanner

Scan your wordpress installation and find out if there are any vulnerable plugins installed.

Scanners

scan:wordpress Scan your wordpress version scan:plugins Scan your installed plugins scan:wordpress Scan your installed themes

Return code

The command will return 1 if there are vulnerable plugins, themes or wordpresses found and show a table with explanations, the command will return 0 if no vulnerable plugins were found.

Providers

Most of the functionality is provided by providers using a Pipeline.

Pre

All the filters that create a list of the installed plugins should mutate the $plugins array before calling $next

Post

All the filters that check for vulnerabilities should mutate the $plugins array after calling $next

Pipeline

This project uses the Laravel 5 Pipeline project.

Config

You can configure the plugin using the wp_scan.yml file.

TODO

Add more providers to add capabilities like reading composer files. Add a scanner that checks wordpress itself Add a scanner that checks themes Cleanup Tests


All versions of wp-vulnerabilities with dependencies

PHP Build Version
Package Version
Requires php Version >=5.4
guzzlehttp/guzzle Version ^5.3|^6.0
illuminate/container Version ^5.2
illuminate/console Version ^5.2
symfony/yaml Version ^2.0|^3.0
illuminate/filesystem Version ^5.2
illuminate/pipeline Version ^5.2
composer/semver Version ^0.1|^1.0
illuminate/events Version ^5.2
zae/wp-fileheader Version ^1.0
Composer command for our command line client (download client) This client runs in each environment. You don't need a specific PHP version etc. The first 20 API calls are free. Standard composer command

The package zae/wp-vulnerabilities contains the following files

Loading the files please wait ....