You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently Wordpress vulnerabilities are not covered completely by Dependency Tracks sources. If they have a CVE, the probably are detected.
But many plugins have vulnerabilities without a CVE (or GHSA, OSV, SNYK, .... ID).
Proposed Behavior
Popular sources for Wordpress vullnerabilities are
The problem with WPScan is that they do not allow any mirroring and do not allow even storing vulnerabilities. Unless you have a commercial enterprise license.
Wordfence seems to have almost the same (20k) vulnerabilities, but is completely free to use including mirroring.
There are some questions to be answered:
Vulnerabilities (WPScan + Wordfence) have a uuid as ID. This doesn't really look/fit very well in the DT UI;
Current Behavior
Currently Wordpress vulnerabilities are not covered completely by Dependency Tracks sources. If they have a CVE, the probably are detected.
But many plugins have vulnerabilities without a CVE (or GHSA, OSV, SNYK, .... ID).
Proposed Behavior
Popular sources for Wordpress vullnerabilities are
The problem with WPScan is that they do not allow any mirroring and do not allow even storing vulnerabilities. Unless you have a commercial enterprise license.
Wordfence seems to have almost the same (20k) vulnerabilities, but is completely free to use including mirroring.
There are some questions to be answered:
Checklist
The text was updated successfully, but these errors were encountered: