This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include
, or for example
via PHP's auto-loading mechanism.
Count | Path | Last Found |
---|---|---|
1 |
packages/analyzer/src/class-declarations.php
Security
Best Practice
|
|
4 |
packages/autoloader/tests/php/bootstrap.php
Security
Best Practice
|
|
2 |
tests/php/lib/class-acceptance-test-case.php
Security
Best Practice
|
|
2 |
tests/php/tests/unit/PathProcessorTest.php
Security
Best Practice
|
|
2 |
projects/packages/connection/src/class-client.php
Security
Bug
Best Practice
|
|
2 |
projects/packages/connection/src/class-manager.php
Security
Best Practice
|
|
1 |
projects/packages/connection/src/class-tokens.php
Security
Best Practice
|
|
2 |
jetpack/_inc/lib/class.core-rest-api-endpoints.php
Security
Bug
|
|
1 |
projects/plugins/jetpack/_inc/lib/class.media.php
Security
Best Practice
|
|
1 |
...s-wpcom-rest-api-v2-endpoint-external-media.php
Security
Best Practice
|