New to Translating WordPress? Read through our Translator Handbook to get started. Hide
| Prio | Original string | Translation | — |
|---|---|---|---|
| ↑ | Get WordPress vulnerability alerts from the WPVulnerability Database API. | You have to log in to add a translation. | Details |
Original untranslated
Get WordPress vulnerability alerts from the WPVulnerability Database API.
You have to log in to edit this translation. |
|||
| ↑ | WPVulnerability | WPVulnerability | Details |
Original current |
|||
| Complete disable: | You have to log in to add a translation. | Details | |
Original untranslated
Complete disable:
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| Only allow ImageMagick shell detection: | You have to log in to add a translation. | Details | |
Original untranslated
Only allow ImageMagick shell detection:
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| Maximum security (no shell commands): | You have to log in to add a translation. | Details | |
Original untranslated
Maximum security (no shell commands):
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| All shell commands are hardcoded and validated - no user input is involved. Commands are logged for security auditing. | You have to log in to add a translation. | Details | |
Original untranslated
All shell commands are hardcoded and validated - no user input is involved. Commands are logged for security auditing.
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| <strong>Examples:</strong> | You have to log in to add a translation. | Details | |
Original untranslated
<strong>Examples:</strong>
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| Allows shell commands only for specified components. Available components: <code>imagemagick</code>, <code>redis</code>, <code>memcached</code>, <code>sqlite</code>. Use for granular control. | You have to log in to add a translation. | Details | |
Original untranslated
Allows shell commands only for specified components. Available components: <code>imagemagick</code>, <code>redis</code>, <code>memcached</code>, <code>sqlite</code>. Use for granular control.
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| <strong>Component whitelist:</strong> | You have to log in to add a translation. | Details | |
Original untranslated
<strong>Component whitelist:</strong>
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| <strong>Security mode (standard/strict/disabled):</strong> | You have to log in to add a translation. | Details | |
Original untranslated
<strong>Security mode (standard/strict/disabled):</strong>
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| Completely disables shell command usage. Falls back to PHP extensions only. Use for maximum security when accuracy loss is acceptable. | You have to log in to add a translation. | Details | |
Original untranslated
Completely disables shell command usage. Falls back to PHP extensions only. Use for maximum security when accuracy loss is acceptable.
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| <strong>Global disable of shell commands:</strong> | You have to log in to add a translation. | Details | |
Original untranslated
<strong>Global disable of shell commands:</strong>
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| WPVulnerability uses a hybrid detection approach for server software (ImageMagick, Redis, Memcached, SQLite): PHP extensions first (most secure), then shell commands as fallback (most accurate). You can control this behavior using security configuration constants in <code>wp-config.php</code>. | You have to log in to add a translation. | Details | |
Original untranslated
WPVulnerability uses a hybrid detection approach for server software (ImageMagick, Redis, Memcached, SQLite): PHP extensions first (most secure), then shell commands as fallback (most accurate). You can control this behavior using security configuration constants in <code>wp-config.php</code>.
CommentFound in description paragraph. You have to log in to edit this translation. |
|||
| <code>disabled</code> - No software detection at all (maximum security) | You have to log in to add a translation. | Details | |
Original untranslated
<code>disabled</code> - No software detection at all (maximum security)
CommentFound in description list item. You have to log in to edit this translation. |
|||
| <code>strict</code> - PHP extensions only, no shell commands (high security, lower accuracy) | You have to log in to add a translation. | Details | |
Original untranslated
<code>strict</code> - PHP extensions only, no shell commands (high security, lower accuracy)
CommentFound in description list item. You have to log in to edit this translation. |
|||
Export as
Comment
Short description.