This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include
, or for example
via PHP's auto-loading mechanism.
Count | Path | Last Found |
---|---|---|
9 |
plugins/jetpack/_inc/lib/markdown/extra.php
Security
Best Practice
|
|
1 |
projects/packages/connection/src/class-tokens.php
Security
Best Practice
|
|
3 |
projects/plugins/jetpack/class.jetpack.php
Security
Best Practice
Bug
|
|
1 |
custom-css/custom-css/preprocessors/scss.inc.php
Security
Best Practice
|
|
1 |
jetpack/modules/infinite-scroll/infinity.php
Security
Best Practice
|
|
2 |
modules/custom-css/csstidy/class.csstidy.php
Security
Best Practice
|
|
1 |
projects/plugins/jetpack/modules/protect.php
Security
Bug
|
|
1 |
projects/plugins/jetpack/_inc/lib/class.media.php
Security
Best Practice
|
|
2 |
plugins/jetpack/class.json-api-endpoints.php
Security
Best Practice
|
|
1 |
class.wpcom-json-api-edit-media-v1-2-endpoint.php
Security
Best Practice
|