[[bin]]
name = "wordpress-vulnerable-scanner"
path = "src/main.rs"
[dependencies.clap]
features = ["derive", "color"]
version = "4.5"
[dependencies.comfy-table]
version = "7"
[dependencies.futures]
version = "0.3"
[dependencies.regex]
version = "1"
[dependencies.reqwest]
default-features = false
features = ["rustls-tls", "gzip", "json"]
version = "0.12"
[dependencies.scraper]
version = "0.22"
[dependencies.semver]
version = "1"
[dependencies.serde]
features = ["derive"]
version = "1.0"
[dependencies.serde_json]
version = "1.0"
[dependencies.thiserror]
version = "2"
[dependencies.tokio]
features = ["rt-multi-thread", "macros"]
version = "1"
[dependencies.url]
version = "2.5"
[dependencies.urlencoding]
version = "2.1"
[dev-dependencies.tokio-test]
version = "0.4"
[dev-dependencies.wiremock]
version = "0.6"
[lib]
name = "wordpress_vulnerable_scanner"
path = "src/lib.rs"
[package]
authors = ["Robert F. Ecker <robert@robdotec.com>"]
autobenches = false
autobins = false
autoexamples = false
autolib = false
autotests = false
build = false
categories = ["command-line-utilities", "web-programming"]
description = "WordPress vulnerability scanner - detects known CVEs in core, plugins, and themes"
documentation = "https://docs.rs/wordpress-vulnerable-scanner"
edition = "2024"
keywords = ["wordpress", "security", "vulnerability", "cve", "scanner"]
license = "MIT"
name = "wordpress-vulnerable-scanner"
readme = "README.md"
repository = "https://github.com/robdotec/wordpress-vulnerable-scanner"
rust-version = "1.91.1"
version = "1.0.0"
[package.metadata.docs.rs]
all-features = true