{"id":43069,"date":"2016-04-07T00:55:27","date_gmt":"2016-04-07T00:55:27","guid":{"rendered":"https:\/\/wordpress.org\/plugins-wp\/vulnerable-plugin-checker\/"},"modified":"2017-11-16T14:53:16","modified_gmt":"2017-11-16T14:53:16","slug":"vulnerable-plugin-checker","status":"publish","type":"plugin","link":"https:\/\/lo.wordpress.org\/plugins\/vulnerable-plugin-checker\/","author":14722999,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","version":"0.3.12","stable_tag":"0.3.12","tested":"4.9.29","requires":"4.0","requires_php":"","requires_plugins":"","header_name":"Vulnerable Plugin Checker","header_author":"Storm Rockwell","header_description":"","assets_banners_color":"fbf9f7","last_updated":"2017-11-16 14:53:16","external_support_url":"","external_repository_url":"","donate_link":"","header_plugin_uri":"https:\/\/www.eridesignstudio.com\/vulnerable-plugin-checker","header_author_uri":"http:\/\/www.stormrockwell.com","rating":3.8,"author_block_rating":0,"active_installs":200,"downloads":8501,"num_ratings":8,"support_threads":0,"support_threads_resolved":0,"author_block_count":0,"sections":["description","installation","changelog","faq"],"tags":[],"upgrade_notice":[],"ratings":{"1":"2","2":0,"3":"1","4":0,"5":"5"},"assets_icons":{"icon-128x128.jpg":{"filename":"icon-128x128.jpg","revision":"1388845","resolution":"128x128","location":"assets"},"icon-256x256.jpg":{"filename":"icon-256x256.jpg","revision":"1388845","resolution":"256x256","location":"assets"}},"assets_banners":{"banner-1544x500.jpg":{"filename":"banner-1544x500.jpg","revision":"1389390","resolution":"1544x500","location":"assets"},"banner-772x250.jpg":{"filename":"banner-772x250.jpg","revision":"1390253","resolution":"772x250","location":"assets"}},"assets_blueprints":{},"all_blocks":[],"tagged_versions":["0.1","0.1.1","0.1.2","0.1.3","0.1.4","0.2","0.2.1","0.2.2","0.2.3","0.2.4","0.3","0.3.1","0.3.10","0.3.11","0.3.12","0.3.2","0.3.3","0.3.4","0.3.5","0.3.6","0.3.7","0.3.8","0.3.9"],"block_files":[],"assets_screenshots":{"screenshot-1.jpg":{"filename":"screenshot-1.jpg","revision":"1388845","resolution":"1","location":"assets"},"screenshot-2.jpg":{"filename":"screenshot-2.jpg","revision":"1388845","resolution":"2","location":"assets"}},"screenshots":{"1":"Backend display of the Plugins page (plugins.php)","2":"Backend display of the VPC Settings page (Settings &gt; VPC Settings)"},"jetpack_post_was_ever_published":false},"plugin_section":[],"plugin_tags":[10674,2391,6464,6460,14957],"plugin_category":[54],"plugin_contributors":[87694],"plugin_business_model":[],"class_list":["post-43069","plugin","type-plugin","status-publish","hentry","plugin_tags-checker","plugin_tags-plugins","plugin_tags-scanner","plugin_tags-vulnerability","plugin_tags-vulnerable","plugin_category-security-and-spam-protection","plugin_contributors-stormrockwell","plugin_committers-stormrockwell"],"banners":{"banner":"https:\/\/ps.w.org\/vulnerable-plugin-checker\/assets\/banner-772x250.jpg?rev=1390253","banner_2x":"https:\/\/ps.w.org\/vulnerable-plugin-checker\/assets\/banner-1544x500.jpg?rev=1389390","banner_rtl":false,"banner_2x_rtl":false},"icons":{"svg":false,"icon":"https:\/\/ps.w.org\/vulnerable-plugin-checker\/assets\/icon-128x128.jpg?rev=1388845","icon_2x":"https:\/\/ps.w.org\/vulnerable-plugin-checker\/assets\/icon-256x256.jpg?rev=1388845","generated":false},"screenshots":[{"src":"https:\/\/ps.w.org\/vulnerable-plugin-checker\/assets\/screenshot-1.jpg?rev=1388845","caption":"Backend display of the Plugins page (plugins.php)"},{"src":"https:\/\/ps.w.org\/vulnerable-plugin-checker\/assets\/screenshot-2.jpg?rev=1388845","caption":"Backend display of the VPC Settings page (Settings &gt; VPC Settings)"}],"raw_content":"<!--section=description-->\n<p>This plugin automatically checks installed plugins for known vulnerabilities utilizing WPScan's API and provides optional email alerts.<\/p>\n\n<p><strong>Features:<\/strong><\/p>\n\n<ul>\n<li>Automatic vulnerability detection in plugins utilizing WPScan's API<\/li>\n<li>Optional email alerts<\/li>\n<li>Utilizes WP Cron to check for new security updates twice a day<\/li>\n<li>Cached API results to decrease backend load time significantly<\/li>\n<\/ul>\n\n<!--section=installation-->\n<p><strong>Installation &amp; Activation<\/strong><\/p>\n\n<ol>\n<li>Upload the folder \"vulnerable-plugin-checker\" to your WordPress Plugins Directory (typically \"\/wp-content\/plugins\/\")<\/li>\n<li>Activate the plugin on your Plugins Page.<\/li>\n<li>Suggestion: Install an SMTP plugin such as WP Mail SMTP to prevent potentially dropped emails<\/li>\n<li>Done!<\/li>\n<\/ol>\n\n<p><strong>Enable Email Updates<\/strong><\/p>\n\n<ol>\n<li>After activating \"Vulnerable Plugin Checker\", go to Settings &gt; VPC Settings<\/li>\n<li>Check off \"Allow Email Alerts\" and enter your email in \"Email Address\"<\/li>\n<li>Click Save Changes<\/li>\n<\/ol>\n\n<!--section=changelog-->\n<h4>0.3.12<\/h4>\n\n<ul>\n<li>Fixed false positive by adding normalizing to the version number in case WPScan's API adds .0 to the version number<\/li>\n<\/ul>\n\n<h4>0.3.11<\/h4>\n\n<ul>\n<li>Now the plugins page only shows only vulnerabilities that affect the current plugin version (suggested by @gbotica)<\/li>\n<li>Fixed the Settings URL in multiple places (reported by @gbotica)<\/li>\n<\/ul>\n\n<h4>0.3.10<\/h4>\n\n<ul>\n<li>Fixed bug where unpatched vulnerabilities were ignored (reported by @pluginvulnerabilities)<\/li>\n<\/ul>\n\n<h4>0.3.9<\/h4>\n\n<ul>\n<li>Fixed notice appearing on PHP7+<\/li>\n<\/ul>\n\n<h4>0.3.8<\/h4>\n\n<ul>\n<li>fixed bug where it wouldn't display the saved email<\/li>\n<\/ul>\n\n<h4>0.3.7<\/h4>\n\n<ul>\n<li>removed sslverify on wp_remote_get<\/li>\n<\/ul>\n\n<h4>0.3.6<\/h4>\n\n<ul>\n<li>changed cURL to wp_remote_get<\/li>\n<li>added vulnerabilities on plugin page<\/li>\n<li>fixed issue with plugin not pulling from cache<\/li>\n<\/ul>\n\n<h4>0.3.5<\/h4>\n\n<ul>\n<li>fixed readme error<\/li>\n<\/ul>\n\n<h4>0.3.4<\/h4>\n\n<ul>\n<li>fixed minor email bug<\/li>\n<\/ul>\n\n<h4>0.3.2<\/h4>\n\n<ul>\n<li>changed language<\/li>\n<\/ul>\n\n<h4>0.3<\/h4>\n\n<ul>\n<li>Rewrote the plugin for better performance, readability, and more<\/li>\n<li>Dismissable error message in all back-end pages if there is a vulnerability<\/li>\n<li>Added SMTP suggestion to prevent dropped emails<\/li>\n<li>Removed success notice from plugin page if there are no vulnerabilities<\/li>\n<li>Fixed a few non-breaking bugs<\/li>\n<li>Added translatable text and translator comments. Translation help is welcome!<\/li>\n<li>Added todo.txt to see my plans for future updates.<\/li>\n<\/ul>\n\n<h4>0.2.4<\/h4>\n\n<ul>\n<li>Fixed conflicts with Gravity Forms<\/li>\n<\/ul>\n\n<h4>0.2.3<\/h4>\n\n<ul>\n<li>Added support for adding multiple email addresses<\/li>\n<\/ul>\n\n<h4>0.2.2<\/h4>\n\n<ul>\n<li>Fixed issue where text display appeared on multiple backend pages<\/li>\n<\/ul>\n\n<h4>0.2<\/h4>\n\n<ul>\n<li>Text display on the plugins page if there are no known vulnerabilities<\/li>\n<li>Runs a scan when a new plugin is activated<\/li>\n<li>Fixed issue when a plugin was deleted it would throw an error<\/li>\n<\/ul>\n\n<h4>0.1.4<\/h4>\n\n<ul>\n<li>WP 4.5 Support<\/li>\n<\/ul>\n\n<h4>0.1.3<\/h4>\n\n<ul>\n<li>Fixed issue when more than one plugin was found vulnerable on plugins.php<\/li>\n<\/ul>\n\n<!--section=faq-->\n<dl>\n<dt>Installation Instructions<\/dt>\n<dd><p><strong>Installation &amp; Activation<\/strong><\/p>\n\n<ol>\n<li>Upload the folder \"vulnerable-plugin-checker\" to your WordPress Plugins Directory (typically \"\/wp-content\/plugins\/\")<\/li>\n<li>Activate the plugin on your Plugins Page.<\/li>\n<li>Suggestion: Install an SMTP plugin such as WP Mail SMTP to prevent potentially dropped emails<\/li>\n<li>Done!<\/li>\n<\/ol>\n\n<p><strong>Enable Email Updates<\/strong><\/p>\n\n<ol>\n<li>After activating \"Vulnerable Plugin Checker\", go to Settings &gt; VPC Settings<\/li>\n<li>Check off \"Allow Email Alerts\" and enter your email in \"Email Address\"<\/li>\n<li>Click Save Changes<\/li>\n<\/ol><\/dd>\n\n<\/dl>","raw_excerpt":"Automatically checks installed plugins for known vulnerabilities and provides optional email alerts.","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin\/43069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin"}],"about":[{"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/types\/plugin"}],"replies":[{"embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/comments?post=43069"}],"author":[{"embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wporg\/v1\/users\/stormrockwell"}],"wp:attachment":[{"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/media?parent=43069"}],"wp:term":[{"taxonomy":"plugin_section","embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_section?post=43069"},{"taxonomy":"plugin_tags","embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_tags?post=43069"},{"taxonomy":"plugin_category","embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_category?post=43069"},{"taxonomy":"plugin_contributors","embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_contributors?post=43069"},{"taxonomy":"plugin_business_model","embeddable":true,"href":"https:\/\/lo.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_business_model?post=43069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}