=== Plugin Vulnerabilities === Contributors: WhiteFirDesign Tags: exploit, plugin security, plugin vulnerability, plugins, security, vuln, vulnerability, vulnerabilities Requires at least: 4.4 Tested up to: 4.5 Stable tag: trunk License: GPLv2 License URI: http://www.gnu.org/licenses/gpl-2.0.html Displays alert when an installed plugin contains a vulnerability in exploited plugins and provides access to our more comprehensive alert service. == Description == This plugin checks the plugins you have installed against a list of vulnerabilities in plugins that we have seen hackers trying to exploit. If the installed version of a plugin is vulnerable an alert is added to the Installed Plugins page, otherwise details of the vulnerabilities are included on the Plugin Vulnerabilities page. This data is helpful when doing the important step of determining how a website was hacked, during the cleanup process of the hacked website. If you want to let us know of a missing frequently exploited vulnerability or if we need to correct something in the listing for an included vulnerability, please contact us [here](https://www.pluginvulnerabilities.com/contact/). For missing vulnerabilities please include a link to the details of the vulnerability. The plugin also displays advisories on the details pages of plugins when we have found that the [plugin's developer has had ongoing issues properly securing their plugins](https://www.pluginvulnerabilities.com/category/developer-security-advisory/). You can also see those advisories on the WordPress website with our [companion Chrome extension](https://chrome.google.com/webstore/detail/plugin-vulnerabilities/nkhfcdjgbohgnjhikglopaingehoimbh). The plugin also provides access to our more comprehensive [Plugin Vulnerabilities service](https://www.pluginvulnerabilities.com), which allows your website to continually check to see if it is using known vulnerable plugins and send you an email alert if a vulnerability is found in one of your installed plugins. == Installation == 1. Copy plugin files to the plugins folder. 2. Activate the plugin. 3. Click the Plugin Vulnerabilities item in the Plugins Menu to see results. == Screenshots == 1. Alert Shown on Installed Plugins Page For Vulnerability In Version of Plugin In Use 2. Full Listing of Vulnerabilities With Frequent Exploitation Attempts That Have Existed in Installed Plugins 3. Developer Advisory on Plugin's Details Page == Changelog == = 2.0.13 = * Added additional vulnerabilities = 2.0.12 = * Added additional vulnerabilities = 2.0.11 = * Added additional vulnerabilities = 2.0.10 = * Added additional vulnerabilities = 2.0.9 = * Added additional vulnerabilities = 2.0.8 = * Added additional vulnerabilities = 2.0.7 = * Added additional vulnerabilities * Added vulnerability listings on plugin detail pages = 2.0.6 = * Added additional vulnerabilities = 2.0.5 = * Added developer advisories = 2.0.4 = * Added additional vulnerabilities = 2.0.3 = * Added additional vulnerabilities * Stopped unnecessary cron runs = 2.0.2 = * Added additional vulnerabilities * Stopped unnecessary cron runs * Fixed issue causing some alerts to not be show on Installed Plugins page * Update for API response change = 2.0.1 = * Added additional vulnerabilities = 2.0 = * Reduced included vulnerabilities to ones that have frequently exploit attempts * Added capability to access Plugin Vulnerabilities service = 1.0.34 = * Added 8 vulnerabilities = 1.0.33 = * Added 6 vulnerabilities = 1.0.32 = * Added 7 vulnerabilities = 1.0.31 = * Added 11 vulnerabilities = 1.0.30 = * Added 12 vulnerabilities = 1.0.29 = * Added 7 vulnerabilities = 1.0.28 = * Added 7 vulnerabilities = 1.0.27 = * Added 8 vulnerabilities = 1.0.26 = * Added 7 vulnerabilities = 1.0.25 = * Added 16 vulnerabilities = 1.0.24 = * Added 8 vulnerabilities = 1.0.23 = * Added 8 vulnerabilities = 1.0.22 = * Added 9 vulnerabilities = 1.0.21 = * Added 8 vulnerabilities = 1.0.20 = * Added 20 vulnerabilities = 1.0.19 = * Added 8 vulnerabilities = 1.0.18 = * Added 9 vulnerabilities = 1.0.17 = * Added optional email alerts * Added 9 vulnerabilities = 1.0.16 = * Added 9 vulnerabilities = 1.0.15 = * Added 11 vulnerabilities = 1.0.14 = * Added 6 vulnerabilities = 1.0.13 = * Added 5 vulnerabilities = 1.0.12 = * Added 11 vulnerabilities = 1.0.11 = * Added 4 vulnerabilities = 1.0.10 = * Added 7 vulnerabilities = 1.0.9 = * Added 4 vulnerabilities = 1.0.8 = * Added 6 vulnerabilities = 1.0.7 = * Added 9 vulnerabilities = 1.0.6 = * Added 17 vulnerabilities = 1.0.5 = * Added 16 vulnerabilities = 1.0.4 = * Added 14 vulnerabilities = 1.0.3 = * Added 30 vulnerabilities = 1.0.2 = * Added 8 vulnerabilities = 1.0.1 = * Added 6 vulnerabilities = 1.0 = * Initial release