[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fYhyHT4B0KJlLYemLv9q40xlKNtKkNXNGX1YxN763qR0":3,"$fnoKtHtkm0gAwU4lBJCYJ5UctCIXKezqrtS9RtK8FsaI":323,"$f8TyfsQUuetvfbad89OCbbKp67tzrg9xOS1X6CDYeBn0":328},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":24,"download_link":25,"security_score":26,"vuln_count":27,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"discovery_status":31,"vulnerabilities":32,"developer":123,"crawl_stats":38,"alternatives":130,"analysis":226,"fingerprints":298},"stop-user-enumeration","Stop User Enumeration","1.7.7","fullworks","https:\u002F\u002Fprofiles.wordpress.org\u002Ffullworks\u002F","\u003Cp>Stop User Enumeration is a security plugin designed to detect and prevent hackers scanning your site for user login names.\u003C\u002Fp>\n\u003Cp>User Enumeration is a type of attack where nefarious parties can probe your website to discover your login name. This is often a pre-cursor to brute-force password attacks. Stop User Enumeration helps block this initial attack and allows you to log IPs launching these attacks to block further attacks in the future.\u003C\u002Fp>\n\u003Cp>Tools like WPSCAN are designed for use by ethical hackers and make efforts to find user login names. Ethical hackers ask permission first, this plugin is designed to reduce the tools when used without permission and when used in conjunction with fail2ban can block those attempts at the firewall.\u003C\u002Fp>\n\u003Cp>If you are on a VPS or dedicated server, as the attack IP is logged, you can use (optional additional configuration) fail2ban to block the attack directly at your server’s firewall, a very powerful solution for VPS owners to stop brute force attacks as well as DDoS attacks.\u003C\u002Fp>\n\u003Cp>If you don’t have access to install fail2ban ( e.g. on a Shared Host ) you can still use this plugin.\u003C\u002Fp>\n\u003Cp>The plugin can stop the user id being leaked by the oEmbed API call.\u003C\u002Fp>\n\u003Cp>Since WordPress 4.5 user data can also be obtained by API calls without logging in, this is a WordPress feature, but if you don’t need it to get user data, this\u003Cbr \u002F>\nplugin will restrict and log that too.\u003C\u002Fp>\n\u003Cp>Since WordPress 5.5  sitemaps are generated by core WP  ( wp-sitemap.xml ) which includes a user\u002Fauthor sitemap that exposes the user id.  You can enable \u002F disable this in the plugin settings.\u003C\u002Fp>\n\u003Ch4>PHP 8.4 compatible\u003C\u002Fh4>\n\u003Cp>Tested on PHP 8.4\u003C\u002Fp>\n\u003Ch4>Features Include\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Blocks user enumeration requests by GET or POST\u003C\u002Fli>\n\u003Cli>Syslogs a block so Fail2Ban can be used to block an IP\u003C\u002Fli>\n\u003Cli>Optionally blocks REST API user requests for non authorized users\u003C\u002Fli>\n\u003Cli>Optionally removes author sitemap\u003C\u002Fli>\n\u003Cli>Optionally removes author from OEMBED\u003C\u002Fli>\n\u003Cli>Optionally removes numbers from comment authors\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Privacy\u003C\u002Fh3>\n\u003Cp>This plugin includes an optional email feature for plugin news and updates. When enabled:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Your email address may be sent to https:\u002F\u002Ffullworksplugins.com for important plugin updates and security notices\u003C\u002Fli>\n\u003Cli>This is completely optional and requires your explicit consent via the opt-in form in the plugin settings\u003C\u002Fli>\n\u003Cli>No data is collected or transmitted without your permission\u003C\u002Fli>\n\u003Cli>You can opt-out at any time from the plugin settings\u003C\u002Fli>\n\u003Cli>No other personal data is collected or transmitted to external services\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>The plugin logs attempted user enumeration attacks locally using WordPress’s standard logging system:\u003Cbr \u002F>\n* IP addresses of potential attackers are logged locally for security monitoring\u003Cbr \u002F>\n* These logs remain on your server and are not transmitted to any external service\u003Cbr \u002F>\n* Logs can be used with fail2ban or similar tools for enhanced security\u003C\u002Fp>\n\u003Cp>For more information about data handling, please visit https:\u002F\u002Ffullworksplugins.com\u002Fprivacy-policy\u002F\u003C\u002Fp>\n","Helps secure your site against hacking attacks through detecting  User Enumeration",50000,1323691,98,130,"2025-12-15T10:48:00.000Z","6.9.4","6.3","7.4",[20,21,22,23],"fail2ban","security","user-enumeration","wpscan","https:\u002F\u002Ffullworksplugins.com\u002Fproducts\u002Fstop-user-enumeration\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.7.zip",91,6,0,"2025-06-26 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[33,51,68,81,96,108],{"id":34,"url_slug":35,"title":36,"description":37,"plugin_slug":4,"theme_slug":38,"affected_versions":39,"patched_in_version":40,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":44,"published_date":29,"updated_date":45,"references":46,"days_to_patch":48,"patch_diff_files":49,"patch_trac_url":38,"research_status":38,"research_verified":50,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":50,"poc_model_used":38,"poc_verification_depth":38},"CVE-2025-4302","stop-user-enumeration-protection-mechanism-bypass","Stop User Enumeration \u003C= 1.7.2 - Protection Mechanism Bypass","The Stop User Enumeration plugin for WordPress is vulnerable to protection mechanism bypass in all versions up to, and including, 1.7.2. This is due to the plugin not restricting URL encoded paths from returning user data. This makes it possible for unauthenticated attackers to enumerate WordPress users.",null,"\u003C=1.7.2","1.7.3","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Protection Mechanism Failure","2025-07-25 13:48:44",[47],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F97553155-c425-4ea1-964a-b5df4263161b?source=api-prod",30,[],false,{"id":52,"url_slug":53,"title":54,"description":55,"plugin_slug":4,"theme_slug":38,"affected_versions":56,"patched_in_version":57,"severity":58,"cvss_score":59,"cvss_vector":60,"vuln_type":61,"published_date":62,"updated_date":63,"references":64,"days_to_patch":66,"patch_diff_files":67,"patch_trac_url":38,"research_status":38,"research_verified":50,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":50,"poc_model_used":38,"poc_verification_depth":38},"WF-3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0-stop-user-enumeration","freemius-sdk-missing-authorization-to-arbitrary-options-update-45","Freemius SDK \u003C= 2.2.3 - Missing Authorization to Arbitrary Options Update","The Freemius SDK for WordPress is vulnerable to authorization bypass due to a missing capability check on the _get_db_option and _set_db_option functions in versions up to, and including, 2.2.3. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change site settings and potentially take over the site.","\u003C1.3.20","1.3.20","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Missing Authorization","2019-02-25 00:00:00","2024-01-22 19:56:02",[65],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-prod",1793,[],{"id":69,"url_slug":70,"title":71,"description":72,"plugin_slug":4,"theme_slug":38,"affected_versions":73,"patched_in_version":74,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":75,"published_date":76,"updated_date":63,"references":77,"days_to_patch":79,"patch_diff_files":80,"patch_trac_url":38,"research_status":38,"research_verified":50,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":50,"poc_model_used":38,"poc_verification_depth":38},"CVE-2017-1000226","stop-user-enumeration-plugin-user-enumeration","Stop User Enumeration plugin \u003C1.3.9 - User Enumeration","The Stop User Enumeration plugin for WordPress is vulnerable to User Enumeration in versions up to, and including, 1.3.8. This is due to a flaw that was found in the REST API. This makes it possible for unauthenticated attackers to perform a POST request in the REST API allows simulating different request types. As such, attackers can perform a POST request with the “users” string in the body of the request, and tell the REST API to act like it’s received a GET request.","\u003C1.3.9","1.3.9","Exposure of Sensitive Information to an Unauthorized Actor","2017-05-16 00:00:00",[78],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe3c52da7-ddfb-4c47-b8d2-2e1db6ec3946?source=api-prod",2443,[],{"id":82,"url_slug":83,"title":84,"description":85,"plugin_slug":4,"theme_slug":38,"affected_versions":86,"patched_in_version":87,"severity":41,"cvss_score":88,"cvss_vector":89,"vuln_type":90,"published_date":91,"updated_date":63,"references":92,"days_to_patch":94,"patch_diff_files":95,"patch_trac_url":38,"research_status":38,"research_verified":50,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":50,"poc_model_used":38,"poc_verification_depth":38},"CVE-2017-18536","stop-user-enumeration-cross-site-scripting","Stop User Enumeration \u003C= 1.3.7 - Cross-Site Scripting","The Stop User Enumeration plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser.","\u003C1.3.8","1.3.8",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2017-01-15 00:00:00",[93],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff6db5e9f-9b3b-44c9-a6d9-78df3ed3b1fc?source=api-prod",2564,[],{"id":97,"url_slug":98,"title":99,"description":100,"plugin_slug":4,"theme_slug":38,"affected_versions":101,"patched_in_version":102,"severity":41,"cvss_score":42,"cvss_vector":43,"vuln_type":75,"published_date":103,"updated_date":63,"references":104,"days_to_patch":106,"patch_diff_files":107,"patch_trac_url":38,"research_status":38,"research_verified":50,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":50,"poc_model_used":38,"poc_verification_depth":38},"WF-e7d4830b-f60a-4556-b40f-1bf9d5a296ad-stop-user-enumeration","stop-user-enumeration-username-enumeration-bypasses","Stop User Enumeration \u003C= 1.3.4 - Username Enumeration Bypasses","The Stop User Enumeration plugin for WordPress is vulnerable to Username Enumeration Bypasses in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to enumerate lists of valid users that can be used for future attacks.","\u003C=1.3.4","1.3.5","2017-01-04 00:00:00",[105],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe7d4830b-f60a-4556-b40f-1bf9d5a296ad?source=api-prod",2575,[],{"id":109,"url_slug":110,"title":111,"description":112,"plugin_slug":4,"theme_slug":38,"affected_versions":113,"patched_in_version":114,"severity":58,"cvss_score":115,"cvss_vector":116,"vuln_type":117,"published_date":118,"updated_date":63,"references":119,"days_to_patch":121,"patch_diff_files":122,"patch_trac_url":38,"research_status":38,"research_verified":50,"research_rounds_completed":28,"research_plan":38,"research_summary":38,"research_vulnerable_code":38,"research_fix_diff":38,"research_exploit_outline":38,"research_model_used":38,"research_started_at":38,"research_completed_at":38,"research_error":38,"poc_status":38,"poc_video_id":38,"poc_summary":38,"poc_steps":38,"poc_tested_at":38,"poc_wp_version":38,"poc_php_version":38,"poc_playwright_script":38,"poc_exploit_code":38,"poc_has_trace":50,"poc_model_used":38,"poc_verification_depth":38},"WF-f8a653ab-7703-4e73-8089-a15ba6cf9718-stop-user-enumeration","stop-user-enumeration-security-bypass","Stop User Enumeration \u003C= 1.2.4 - Security Bypass","The WordPress Stop User Enumeration Plugin for WordPress is vulnerable to Security Bypass in versions up to, and including, 1.2.4 via POST requests as the protection only functions as intended with GET requests. This makes it possible for unauthenticated attackers to perform otherwise secured actions.","\u003C=1.2.4","1.2.5",7.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:L","Improper Access Control","2014-02-03 00:00:00",[120],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff8a653ab-7703-4e73-8089-a15ba6cf9718?source=api-prod",3641,[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":124,"total_installs":125,"avg_security_score":126,"avg_patch_time_days":127,"trust_score":128,"computed_at":129},13,78760,93,1299,74,"2026-05-19T19:44:48.935Z",[131,152,168,190,210],{"slug":132,"name":133,"version":134,"author":135,"author_profile":136,"description":137,"short_description":138,"active_installs":139,"downloaded":140,"rating":141,"num_ratings":142,"last_updated":143,"tested_up_to":144,"requires_at_least":145,"requires_php":18,"tags":146,"homepage":149,"download_link":150,"security_score":151,"vuln_count":28,"unpatched_count":28,"last_vuln_date":38,"fetched_at":30},"wp-author-security","WP Author Security","1.5.0","mgm security partners GmbH","https:\u002F\u002Fprofiles.wordpress.org\u002Fmgmsp\u002F","\u003Cp>WP Author Security is a lightweight but powerful plugin to protect against user enumeration attacks on author pages and other places where valid user names can be obtained.\u003C\u002Fp>\n\u003Cp>By default, WordPress will display some sensitive information on author pages.\u003Cbr \u002F>\nThe author page is typically called by requesting the URI \u003Ccode>https:\u002F\u002Fyourdomain.tld\u002F?author=\u003Cid>\u003C\u002Fcode> or with permalinks \u003Ccode>https:\u002F\u002Fyourdomain.tld\u002Fauthor\u002F\u003Cusername>\u003C\u002Fcode>.\u003Cbr \u002F>\nThe page will include (depending on your theme) the full name (first and last name) as well as the username of the author which is used to log in to WordPress.\u003C\u002Fp>\n\u003Cp>In some cases, it is not wanted to expose this information to the public. An attacker is able to brute force valid IDs or valid usernames. This information might be used for further attacks like social engineering attacks or log in brute force attacks with gathered usernames.\u003Cbr \u002F>\n\u003Cem>However, when using the plugin and you disable author pages completely it must be noted that you need to take care that your active theme will not display the author name itself on posts like “Posted by admin” or something like that. This is something the plugin will not handle (at the moment).\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>By using the extension, you are able to disable the author pages either completely or display them only when the author has at least one published post. When the page is disabled the default 404 error page of the active theme is displayed.\u003C\u002Fp>\n\u003Cp>In addition, the plugin will also protect other locations which are commonly used by attackers to gather valid user names. These are:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>The REST API for users which will list all users with published posts by default.\u003Cbr \u002F>\n  https:\u002F\u002Fyourdomain.tld\u002Fwp-json\u002Fwp\u002Fv2\u002Fusers\u003C\u002Fli>\n\u003Cli>The log in page where different error messages will indicate whether an entered user name or mail address exists or not. The plugin will display a neutral error message independently whether the user exists or not.\u003C\u002Fli>\n\u003Cli>The password forgotten function will also allow an attacker to check for the existence of a user. As for the log in page the plugin will display a neutral message even when the user does not exists.\u003C\u002Fli>\n\u003Cli>Requesting the feed endpoint \u002Ffeed of your blog will also allow others to see the username or display name of the author. The plugin will remove the name from the result list.\u003C\u002Fli>\n\u003Cli>WordPress supports so-called oEmbeds. This is a technique to embed a reference to a post into another post. However, this reference will also contain the author name and a direct link to the profile page. The plugin will also remove the name and link here.\u003C\u002Fli>\n\u003Cli>Since WordPress 5.5 a default sitemap can be reached via \u002Fwp-sitemap.xml. This sitemap will disclose the usernames of all authors. If this should not be disclosed you are able to disable this feature of WordPress.\u003C\u002Fli>\n\u003C\u002Ful>\n","Protect against user enumeration attacks on author pages and other places where valid user names can be obtained.",500,6619,100,2,"2023-04-12T07:32:00.000Z","6.2.9","4.7",[147,148,21,22,23],"author","privacy","https:\u002F\u002Fgithub.com\u002Fmgm-sp\u002Fwp-author-security","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-author-security.1.5.0.zip",85,{"slug":153,"name":154,"version":155,"author":156,"author_profile":157,"description":158,"short_description":159,"active_installs":160,"downloaded":161,"rating":28,"num_ratings":28,"last_updated":162,"tested_up_to":163,"requires_at_least":164,"requires_php":165,"tags":166,"homepage":165,"download_link":167,"security_score":151,"vuln_count":28,"unpatched_count":28,"last_vuln_date":38,"fetched_at":30},"no-user-enumeration","No User Enumeration","1.3.2","Carlos","https:\u002F\u002Fprofiles.wordpress.org\u002Fcarlost800\u002F","\u003Cp>In many WordPress installations is possible enumerate usernames through the author archives, using urls like this:\u003C\u002Fp>\n\u003Cp>http:\u002F\u002Fwpsite\u002F?author=1\u003C\u002Fp>\n\u003Cp>http:\u002F\u002Fwpsite\u002F?author=1\u002F\u003C\u002Fp>\n\u003Cp>http:\u002F\u002Fwpsite\u002F?bypass=1&author%00=1\u003C\u002Fp>\n\u003Cp>http:\u002F\u002Fwpsite\u002F?author%00=%001\u003C\u002Fp>\n\u003Cp>http:\u002F\u002Fwpsite\u002F?%61uthor=1\u003C\u002Fp>\n\u003Cp>And recently wordpress since 4.7 comes with a rest api integrated that allow list users:\u003C\u002Fp>\n\u003Cp>curl -s http:\u002F\u002Fwpsite\u002Fwp-json\u002Fwp\u002Fv2\u002Fusers\u002F\u003Cbr \u002F>\ncurl -s http:\u002F\u002Fwpsite\u002F?rest_route=\u002Fwp\u002Fv2\u002Fusers\u003Cbr \u002F>\ncurl http:\u002F\u002Fwpsite\u002F?_method=GET -d rest_route=\u002Fwp\u002Fv2\u002Fusers\u003C\u002Fp>\n\u003Cp>Know the username of a administrator is the half battle, now an attacker only need guest the password.\u003Cbr \u002F>\nThis plugin stop it.\u003C\u002Fp>\n\u003Cp>Also, is possible get usernames from the post entries.\u003Cbr \u002F>\nThis plugin, hide the name of the author in a post entry if he is not using a nickname.\u003Cbr \u002F>\nAlso, hide the url page link of an administrator author.\u003C\u002Fp>\n\u003Cp>The main goal is hide the administrators usernames.\u003Cbr \u002F>\nObviously, is better not choose “admin” as the username because is easiliy guessable.\u003C\u002Fp>\n","Stop user enumeration for security.",200,4761,"2019-10-23T03:11:00.000Z","5.2.24","2.9","",[21,22,23],"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fno-user-enumeration.1.3.2.zip",{"slug":169,"name":170,"version":171,"author":172,"author_profile":173,"description":174,"short_description":175,"active_installs":176,"downloaded":177,"rating":178,"num_ratings":179,"last_updated":180,"tested_up_to":181,"requires_at_least":182,"requires_php":18,"tags":183,"homepage":187,"download_link":188,"security_score":26,"vuln_count":189,"unpatched_count":28,"last_vuln_date":62,"fetched_at":30},"wp-fail2ban","WP fail2ban – Advanced Security","5.4.1","invisnet","https:\u002F\u002Fprofiles.wordpress.org\u002Finvisnet\u002F","\u003Cp>\u003Ca href=\"http:\u002F\u002Fwww.fail2ban.org\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=wp-fail2ban-premium-5.4.1\" rel=\"nofollow ugc\">fail2ban\u003C\u002Fa> is one of the simplest and most effective security measures you can implement to protect your WordPress site.\u003C\u002Fp>\n\u003Cp>\u003Cem>WP fail2ban\u003C\u002Fem> provides the link between WordPress and \u003Ccode>fail2ban\u003C\u002Fcode>:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>Oct 17 20:59:54 foobar wordpress(www.example.com)[1234]: Authentication failure for admin from 192.168.0.1\nOct 17 21:00:00 foobar wordpress(www.example.com)[2345]: Accepted password for admin from 192.168.0.1\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>\u003Cem>WPf2b\u003C\u002Fem> comes with three \u003Ccode>fail2ban\u003C\u002Fcode> filters: \u003Ccode>wordpress-hard.conf\u003C\u002Fcode>, \u003Ccode>wordpress-soft.conf\u003C\u002Fcode>, and \u003Ccode>wordpress-extra.conf\u003C\u002Fcode>. These are designed to allow a split between immediate banning (hard) and the traditional more graceful approach (soft), with extra rules for custom configurations.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Failed Login Attempts\u003C\u002Fstrong>\u003Cbr \u002F>\nThe very first feature of \u003Cem>WPf2b\u003C\u002Fem>: logging failed login attempts so the IP can be banned. Just as useful today as it was then.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Block User Enumeration\u003C\u002Fstrong>\u003Cbr \u002F>\nOne of the most common precursors to a password-guessing brute force attack is \u003Ca href=\"https:\u002F\u002Fwp-fail2ban.com\u002Ffeatures\u002Fblock-user-enumeration\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=wp-fail2ban-premium-5.4.1\" rel=\"nofollow ugc\">user enumeration\u003C\u002Fa>. \u003Cem>WPf2b\u003C\u002Fem> can block it, stopping the attack before it starts.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Block username logins\u003C\u002Fstrong>\u003Cbr \u002F>\nSometimes it’s not possible to block user enumeration (for example, if your theme provides Author profiles). \u003Cem>WPf2b\u003C\u002Fem> can require users to login with their email address instead of their username.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Blocking Users\u003C\u002Fstrong>\u003Cbr \u002F>\nAnther of the older \u003Cem>WPf2b\u003C\u002Fem> features: the login process can be aborted for specified usernames.\u003Cbr \u002F>\nSay a bot collected your site’s usernames before you blocked user enumeration. Once you’ve changed all the usernames, add the old ones to the list; anything using them will trigger a “hard” fail.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Empty Username Login Attempts\u003C\u002Fstrong>\u003Cbr \u002F>\nSome bots will try to login without a username; harmless, but annoying. These attempts are logged as a “soft” fail so the more persistent bots will be banned.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Spam\u003C\u002Fstrong>\u003Cbr \u002F>\n\u003Cem>WPf2b\u003C\u002Fem> will log a spammer’s IP address as a “hard” fail when their comment is marked as spam; the Premium version will also log the IP when Akismet discards “obvious” spam.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Attempted Comments\u003C\u002Fstrong>\u003Cbr \u002F>\nSome spam bots try to comment on everything, even things that aren’t there. \u003Cem>WPf2b\u003C\u002Fem> detects these and logs them as a “hard” fail.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Pingbacks\u003C\u002Fstrong>\u003Cbr \u002F>\nPingbacks are a great feature, but they can be abused to attack the rest of the WWW. Rather than disable them completely, \u003Cem>WPf2b\u003C\u002Fem> effectively rate-limits potential attackers by logging the IP address as a “soft” fail.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Block XML‑RPC Requests\u003C\u002Fstrong> [Premium]\u003Cbr \u002F>\nThe only reason most sites need XML‑RPC (other than Pingbacks) is for Jetpack; \u003Cem>WPf2b\u003C\u002Fem> Premium can block XML‑RPC while allowing Jetpack and\u002For Pingbacks.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Block Countries\u003C\u002Fstrong> [Premium]\u003Cbr \u002F>\nSometimes you just need a bigger hammer – if you’re seeing nothing but attacks from some countries, block them!\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Cloudflare and Proxy Servers\u003C\u002Fstrong>\u003Cbr \u002F>\n\u003Cem>WPf2b\u003C\u002Fem> will work with \u003Ca href=\"https:\u002F\u002Fwp-fail2ban.com\u002Ffeatures\u002Fcloudflare-and-proxy-servers\u002F?utm_source=wordpress.org&utm_medium=readme&utm_campaign=wp-fail2ban-premium-5.4.1\" rel=\"nofollow ugc\">Cloudflare\u003C\u002Fa>, and the Premium version will automatically update the list of Cloudflare IP addresses.\u003Cbr \u002F>\nYou can also configure your own list of trusted proxies.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>syslog Dashboard Widget\u003C\u002Fstrong>\u003Cbr \u002F>\nEver wondered what’s being logged? The dashboard widget shows the last 5 messages; the Premium version keeps a full history to help you analyse and prevent attacks.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Site Health Check\u003C\u002Fstrong>\u003Cbr \u002F>\n\u003Cem>WPf2b\u003C\u002Fem> will (try to) check that your \u003Ccode>fail2ban\u003C\u002Fcode> configuration is sane and that the filters are up to date; out-of-date filters are the primary cause of \u003Cem>WPf2b\u003C\u002Fem> not working as well as it can.\u003Cbr \u002F>\nWhen did you last run the Site Health tool?\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>\u003Ccode>mu-plugins\u003C\u002Fcode> Support\u003C\u002Fstrong>\u003Cbr \u002F>\n\u003Cem>WPf2b\u003C\u002Fem> can easily be configured as a “must-use plugin” – see \u003Ca href=\"https:\u002F\u002Fdocs.wp-fail2ban.com\u002Fen\u002F5.4\u002Fconfiguration.html?utm_source=wordpress.org&utm_medium=readme&utm_campaign=wp-fail2ban-premium-5.4.1#mu-plugins-support\" rel=\"nofollow ugc\">Configuration\u003C\u002Fa>.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>API to Extend \u003Cem>WPf2b\u003C\u002Fem>\u003C\u002Fstrong>\u003Cbr \u002F>\nIf your plugin can detect behaviour which should be blocked, why reinvent the wheel?\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Event Hooks\u003C\u002Fstrong> [Premium]\u003Cbr \u002F>\nNeed to do something special when \u003Cem>WPf2b\u003C\u002Fem> detects a particular event? \u003Ca href=\"https:\u002F\u002Fdocs.wp-fail2ban.com\u002Fen\u002F5.4\u002Fdevelopers\u002Fevents.html?utm_source=wordpress.org&utm_medium=readme&utm_campaign=wp-fail2ban-premium-5.4.1\" rel=\"nofollow ugc\">There’s a hook for that\u003C\u002Fa>.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Premium\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Web Application Firewall (WAF)\u003C\u002Fli>\n\u003Cli>Akismet support.\u003C\u002Fli>\n\u003Cli>Block XML‑RPC while allowing Jetpack and\u002For Pingbacks.\u003C\u002Fli>\n\u003Cli>Block Countries.\u003C\u002Fli>\n\u003Cli>Auto-update Cloudflare IPs.\u003C\u002Fli>\n\u003Cli>Event log.\u003C\u002Fli>\n\u003Cli>Event hooks.\u003C\u002Fli>\n\u003C\u002Ful>\n","WP fail2ban uses fail2ban to protect your WordPress site.",70000,1980109,84,71,"2025-04-29T15:21:00.000Z","6.8.5","4.2",[184,20,185,21,186],"brute-force","login","syslog","https:\u002F\u002Fwp-fail2ban.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-fail2ban.5.4.1.zip",1,{"slug":23,"name":191,"version":192,"author":193,"author_profile":194,"description":195,"short_description":196,"active_installs":197,"downloaded":198,"rating":199,"num_ratings":200,"last_updated":201,"tested_up_to":16,"requires_at_least":202,"requires_php":203,"tags":204,"homepage":208,"download_link":209,"security_score":141,"vuln_count":28,"unpatched_count":28,"last_vuln_date":38,"fetched_at":30},"WPScan – WordPress Security Scanner","1.16","ethicalhack3r","https:\u002F\u002Fprofiles.wordpress.org\u002Fethicalhack3r\u002F","\u003Cp>\u003Cstrong>Please note:\u003C\u002Fstrong> This plugin is no longer actively supported for non-enterprise customers. \u003Cstrong>We recommend using \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fjetpack-protect\u002F\" rel=\"ugc\">Jetpack Protect\u003C\u002Fa>\u003C\u002Fstrong> – a free security plugin for WordPress that leverages the extensive database of WPScan. Jetpack Protect scans your site and warns you about vulnerabilities, keeping your site one step ahead of security threats and malware.\u003C\u002Fp>\n\u003Cp>The WPScan WordPress security plugin is unique in that it uses its own manually curated \u003Ca href=\"https:\u002F\u002Fwpscan.com\u002F\" rel=\"nofollow ugc\">WPScan WordPress Vulnerability Database\u003C\u002Fa>. The vulnerability database has been around since 2014 and is updated on a daily basis by dedicated WordPress security specialists and the community at large. The database includes more than 21,000 known security vulnerabilities. The plugin uses this database to scan for \u003Ca href=\"https:\u002F\u002Fwpscan.com\u002Fwordpresses\" rel=\"nofollow ugc\">WordPress vulnerabilities\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fwpscan.com\u002Fplugins\" rel=\"nofollow ugc\">plugin vulnerabilities\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fwpscan.com\u002Fthemes\" rel=\"nofollow ugc\">theme vulnerabilities\u003C\u002Fa>, and has the options to schedule automated daily scans and to send email notifications.\u003C\u002Fp>\n\u003Cp>WPScan has a Free API plan that should be suitable for most WordPress websites, however, also has paid plans for users who may need more API calls. To use the WPScan WordPress Security Plugin you will need to use a free API token by \u003Ca href=\"https:\u002F\u002Fwpscan.com\u002F\" rel=\"nofollow ugc\">registering here\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>The Free plan allows 25 API requests per day. View the different available \u003Ca href=\"https:\u002F\u002Fwpscan.com\u002Fapi\" rel=\"nofollow ugc\">API plans\u003C\u002Fa>.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Ch4>How many API requests do you need?\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Our WordPress scanner makes one API request for the WordPress version, one request per installed plugin and one request per installed theme.\u003C\u002Fli>\n\u003Cli>On average, a WordPress website has 22 installed plugins.\u003C\u002Fli>\n\u003Cli>The Free plan should cover around 50% of all WordPress websites.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Security Checks\u003C\u002Fh4>\n\u003Cp>The WPScan WordPress Security Plugin will also check for other security issues, which do not require an API token, such as:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Check for debug.log files\u003C\u002Fli>\n\u003Cli>Check for wp-config.php backup files\u003C\u002Fli>\n\u003Cli>Check if XML-RPC is enabled\u003C\u002Fli>\n\u003Cli>Check for code repository files\u003C\u002Fli>\n\u003Cli>Check if default secret keys are used\u003C\u002Fli>\n\u003Cli>Check for exported database files\u003C\u002Fli>\n\u003Cli>Weak passwords\u003C\u002Fli>\n\u003Cli>HTTPS enabled\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>What does the plugin do?\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Scans for known WordPress vulnerabilities, plugin vulnerabilities and theme vulnerabilities;\u003C\u002Fli>\n\u003Cli>Does additional security checks;\u003C\u002Fli>\n\u003Cli>Shows an icon on the Admin Toolbar with the total number of security vulnerabilities found;\u003C\u002Fli>\n\u003Cli>Notifies you by mail when new security vulnerabilities are found.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Further Reading\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpscan.com\u002F\" rel=\"nofollow ugc\">WPScan WordPress Vulnerability Database\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwpscan.com\u002Fwordpress-security-scanner\" rel=\"nofollow ugc\">WPScan WordPress Security Scanner\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Ftwitter.com\u002F_wpscan_\" rel=\"nofollow ugc\">WPScan Twitter\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","WPScan WordPress Security Scanner - Scans your system for security vulnerabilities listed in the WPScan Vulnerability Database.",9000,267904,76,28,"2026-01-12T13:09:00.000Z","3.4","5.5",[205,21,206,23,207],"hack","vulnerability","wpvulndb","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwpscan\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwpscan.1.16.zip",{"slug":211,"name":212,"version":213,"author":214,"author_profile":215,"description":216,"short_description":217,"active_installs":218,"downloaded":219,"rating":141,"num_ratings":220,"last_updated":221,"tested_up_to":181,"requires_at_least":222,"requires_php":18,"tags":223,"homepage":224,"download_link":225,"security_score":141,"vuln_count":28,"unpatched_count":28,"last_vuln_date":38,"fetched_at":30},"wp-fail2ban-redux","WP Fail2Ban Redux","0.9.2","Brandon Allen","https:\u002F\u002Fprofiles.wordpress.org\u002Fthebrandonallen\u002F","\u003Cp>WP Fail2Ban Redux records various WordPress events to your server’s system log for integration with \u003Ca href=\"http:\u002F\u002Fwww.fail2ban.org\u002F\" rel=\"nofollow ugc\">Fail2Ban\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>This plugin is (\u003Cem>mostly\u003C\u002Fem>) a drop-in replacement for \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-fail2ban\u002F\" rel=\"ugc\">WP fail2ban\u003C\u002Fa> by \u003Ca href=\"https:\u002F\u002Fcharles.lecklider.org\u002F\" rel=\"nofollow ugc\">Charles Lecklider\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>While WP fail2ban is a great plugin, there are a number of improvements that could be made. In order to facilitate these improvements, a major refactoring of the codebase was necessary.\u003C\u002Fp>\n\u003Cp>The core functionality between \u003Cem>WP Fail2Ban Redux\u003C\u002Fem> and WP fail2ban remains the same. \u003Cem>WP Fail2Ban Redux\u003C\u002Fem> is considered to be \u003Cem>mostly\u003C\u002Fem> a drop-in replacement, because all constants have been replaced with filters, and will, possibly, require some upgrade work. Don’t work it’s as simple as implementing the constants.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>The following events are recorded by default:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Failed XML-RPC authentication attempts.\u003C\u002Fli>\n\u003Cli>Successful authentication attempts.\u003C\u002Fli>\n\u003Cli>Failed authentication attempts — differentiated by a user’s existence.\u003C\u002Fli>\n\u003Cli>Pingback errors.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>The following events can be enabled via filter:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Pingback requests.\u003C\u002Fli>\n\u003Cli>Blocked user enumeration attempts.\u003C\u002Fli>\n\u003Cli>Authentication attempts for blocked usernames.\u003C\u002Fli>\n\u003Cli>Spammed comments.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Extra documentation is available on the \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fthebrandonallen\u002Fwp-fail2ban-redux\u002Fwiki\" rel=\"nofollow ugc\">WP Fail2Ban Redux GitHub Wiki\u003C\u002Fa>.\u003C\u002Fp>\n","Records various WordPress events to your server's system log for integration with Fail2Ban.",8000,97107,15,"2025-05-27T05:32:00.000Z","5.8",[20,185,21,186],"https:\u002F\u002Fgithub.com\u002Fthebrandonallen\u002Fwp-fail2ban-redux\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-fail2ban-redux.0.9.2.zip",{"attackSurface":227,"codeSignals":265,"taintFlows":275,"riskAssessment":276,"analyzedAt":297},{"hooks":228,"ajaxHandlers":261,"restRoutes":262,"shortcodes":263,"cronEvents":264,"entryPointCount":28,"unprotectedCount":28},[229,235,241,246,249,252,255,258],{"type":230,"name":231,"callback":232,"file":233,"line":234},"action","admin_enqueue_scripts","enqueue_scripts","admin\\class-admin-pages.php",43,{"type":236,"name":237,"callback":238,"priority":239,"file":233,"line":240},"filter","screen_layout_columns","screen_layout_column",10,46,{"type":230,"name":242,"callback":243,"file":244,"line":245},"admin_menu","anonymous","includes\\class-core.php",114,{"type":230,"name":247,"callback":243,"file":244,"line":248},"wp_enqueue_scripts",154,{"type":230,"name":250,"callback":243,"file":244,"line":251},"init",157,{"type":236,"name":253,"callback":243,"file":244,"line":254},"rest_pre_dispatch",158,{"type":236,"name":256,"callback":243,"file":244,"line":257},"wp_sitemaps_add_provider",160,{"type":236,"name":259,"callback":243,"file":244,"line":260},"oembed_response_data",163,[],[],[],[],{"dangerousFunctions":266,"sqlUsage":267,"outputEscaping":269,"fileOperations":28,"externalRequests":28,"nonceChecks":28,"capabilityChecks":28,"bundledLibraries":274},[],{"prepared":28,"raw":28,"locations":268},[],{"escaped":124,"rawEcho":189,"locations":270},[271],{"file":233,"line":272,"context":273},73,"raw output",[],[],{"summary":277,"deductions":278},"The \"stop-user-enumeration\" plugin v1.7.7 exhibits a mixed security posture. While static analysis reveals a commendably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or proper permission checks, and all SQL queries utilize prepared statements, there are significant historical concerns.\n\nThe plugin has a history of 6 known Common Vulnerabilities and Exposures (CVEs), with 2 high and 4 medium severity vulnerabilities. The types of past vulnerabilities, including Protection Mechanism Failure, Missing Authorization, Exposure of Sensitive Information, Cross-Site Scripting, and Improper Access Control, suggest recurring issues in how the plugin handles user access and input validation. The most recent vulnerability was identified on 2025-06-26, indicating ongoing security challenges.  The absence of taint analysis data and the zero count for dangerous functions, file operations, and external HTTP requests in the static analysis are positive signs, but they do not fully mitigate the risk presented by the historical vulnerability patterns.\n\nIn conclusion, the current version of the plugin appears to have addressed immediate code-level risks in its entry points and database interactions based on static analysis. However, the substantial historical vulnerability record, particularly the high and medium severity issues involving authorization, access control, and information exposure, necessitates a cautious approach. The plugin's security is weakened by its past, and it is crucial for users to ensure they are running the absolute latest version, as the last known vulnerability is surprisingly recent and implies potential for future undiscovered or re-emerging issues.",[279,282,284,287,289,292,294],{"reason":280,"points":281},"Total known CVEs: 6",18,{"reason":283,"points":239},"High severity CVEs: 2",{"reason":285,"points":286},"Medium severity CVEs: 4",16,{"reason":288,"points":220},"Last vulnerability: 2025-06-26",{"reason":290,"points":291},"Missing Nonce Checks (0\u002F0)",5,{"reason":293,"points":291},"Missing Capability Checks (0\u002F0)",{"reason":295,"points":296},"Unsanitized Output (6% unescaped)",3,"2026-03-16T17:18:10.197Z",{"wat":299,"direct":308},{"assetPaths":300,"generatorPatterns":303,"scriptPaths":304,"versionParams":305},[301,302],"\u002Fwp-content\u002Fplugins\u002Fstop-user-enumeration\u002Fadmin\u002Fcss\u002Fadmin-style.css","\u002Fwp-content\u002Fplugins\u002Fstop-user-enumeration\u002Fadmin\u002Fjs\u002Fadmin-script.js",[],[302],[306,307],"stop-user-enumeration\u002Fadmin\u002Fcss\u002Fadmin-style.css?ver=","stop-user-enumeration\u002Fadmin\u002Fjs\u002Fadmin-script.js?ver=",{"cssClasses":309,"htmlComments":311,"htmlAttributes":315,"restEndpoints":318,"jsGlobals":319,"shortcodeOutput":322},[310],"fs-settings-meta-box-wrap",[312,313,314],"\u003C![CDATA[","\u002F\u002F]]>","\u002F\u002F @TODO think about local script",[316,317],"id=\"fs-smb-form\"","id=\"fx-smb-form\"",[],[320,321],"window.jQuery","jQuery",[],{"error":324,"url":325,"statusCode":326,"statusMessage":327,"message":327},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fstop-user-enumeration\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":329,"versions":330},37,[331,336,343,350,357,363,371,379,387,395,403,411,419,427,434,442,450,458,466,474,482,490,498,506,514,522,530,538,546,554,562,570,578,586,594,602,610],{"version":6,"download_url":25,"svn_tag_url":332,"released_at":38,"has_diff":50,"diff_files_changed":333,"diff_lines":38,"trac_diff_url":334,"vulnerabilities":335,"is_current":324},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7.6&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.7",[],{"version":337,"download_url":338,"svn_tag_url":339,"released_at":38,"has_diff":50,"diff_files_changed":340,"diff_lines":38,"trac_diff_url":341,"vulnerabilities":342,"is_current":50},"1.7.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7.5&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.6",[],{"version":344,"download_url":345,"svn_tag_url":346,"released_at":38,"has_diff":50,"diff_files_changed":347,"diff_lines":38,"trac_diff_url":348,"vulnerabilities":349,"is_current":50},"1.7.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7.4&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.5",[],{"version":351,"download_url":352,"svn_tag_url":353,"released_at":38,"has_diff":50,"diff_files_changed":354,"diff_lines":38,"trac_diff_url":355,"vulnerabilities":356,"is_current":50},"1.7.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7.3&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.4",[],{"version":40,"download_url":358,"svn_tag_url":359,"released_at":38,"has_diff":50,"diff_files_changed":360,"diff_lines":38,"trac_diff_url":361,"vulnerabilities":362,"is_current":50},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7.2&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.3",[],{"version":364,"download_url":365,"svn_tag_url":366,"released_at":38,"has_diff":50,"diff_files_changed":367,"diff_lines":38,"trac_diff_url":368,"vulnerabilities":369,"is_current":50},"1.7.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7.1&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.2",[370],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":372,"download_url":373,"svn_tag_url":374,"released_at":38,"has_diff":50,"diff_files_changed":375,"diff_lines":38,"trac_diff_url":376,"vulnerabilities":377,"is_current":50},"1.7.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.7&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7.1",[378],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":380,"download_url":381,"svn_tag_url":382,"released_at":38,"has_diff":50,"diff_files_changed":383,"diff_lines":38,"trac_diff_url":384,"vulnerabilities":385,"is_current":50},"1.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.6.3&new_path=%2Fstop-user-enumeration%2Ftags%2F1.7",[386],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":388,"download_url":389,"svn_tag_url":390,"released_at":38,"has_diff":50,"diff_files_changed":391,"diff_lines":38,"trac_diff_url":392,"vulnerabilities":393,"is_current":50},"1.6.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.6.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.6.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.6.2&new_path=%2Fstop-user-enumeration%2Ftags%2F1.6.3",[394],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":396,"download_url":397,"svn_tag_url":398,"released_at":38,"has_diff":50,"diff_files_changed":399,"diff_lines":38,"trac_diff_url":400,"vulnerabilities":401,"is_current":50},"1.6.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.6.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.6.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.6.1&new_path=%2Fstop-user-enumeration%2Ftags%2F1.6.2",[402],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":404,"download_url":405,"svn_tag_url":406,"released_at":38,"has_diff":50,"diff_files_changed":407,"diff_lines":38,"trac_diff_url":408,"vulnerabilities":409,"is_current":50},"1.6.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.6.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.6.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.6&new_path=%2Fstop-user-enumeration%2Ftags%2F1.6.1",[410],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":412,"download_url":413,"svn_tag_url":414,"released_at":38,"has_diff":50,"diff_files_changed":415,"diff_lines":38,"trac_diff_url":416,"vulnerabilities":417,"is_current":50},"1.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.5.1&new_path=%2Fstop-user-enumeration%2Ftags%2F1.6",[418],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":420,"download_url":421,"svn_tag_url":422,"released_at":38,"has_diff":50,"diff_files_changed":423,"diff_lines":38,"trac_diff_url":424,"vulnerabilities":425,"is_current":50},"1.5.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.5.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.5.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.5.0&new_path=%2Fstop-user-enumeration%2Ftags%2F1.5.1",[426],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":134,"download_url":428,"svn_tag_url":429,"released_at":38,"has_diff":50,"diff_files_changed":430,"diff_lines":38,"trac_diff_url":431,"vulnerabilities":432,"is_current":50},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.5.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.5.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.9&new_path=%2Fstop-user-enumeration%2Ftags%2F1.5.0",[433],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":435,"download_url":436,"svn_tag_url":437,"released_at":38,"has_diff":50,"diff_files_changed":438,"diff_lines":38,"trac_diff_url":439,"vulnerabilities":440,"is_current":50},"1.4.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.8&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.9",[441],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":443,"download_url":444,"svn_tag_url":445,"released_at":38,"has_diff":50,"diff_files_changed":446,"diff_lines":38,"trac_diff_url":447,"vulnerabilities":448,"is_current":50},"1.4.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.7&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.8",[449],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":451,"download_url":452,"svn_tag_url":453,"released_at":38,"has_diff":50,"diff_files_changed":454,"diff_lines":38,"trac_diff_url":455,"vulnerabilities":456,"is_current":50},"1.4.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.6&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.7",[457],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":459,"download_url":460,"svn_tag_url":461,"released_at":38,"has_diff":50,"diff_files_changed":462,"diff_lines":38,"trac_diff_url":463,"vulnerabilities":464,"is_current":50},"1.4.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.5&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.6",[465],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":467,"download_url":468,"svn_tag_url":469,"released_at":38,"has_diff":50,"diff_files_changed":470,"diff_lines":38,"trac_diff_url":471,"vulnerabilities":472,"is_current":50},"1.4.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.4&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.5",[473],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":475,"download_url":476,"svn_tag_url":477,"released_at":38,"has_diff":50,"diff_files_changed":478,"diff_lines":38,"trac_diff_url":479,"vulnerabilities":480,"is_current":50},"1.4.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.3&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.4",[481],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":483,"download_url":484,"svn_tag_url":485,"released_at":38,"has_diff":50,"diff_files_changed":486,"diff_lines":38,"trac_diff_url":487,"vulnerabilities":488,"is_current":50},"1.4.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.2&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.3",[489],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":491,"download_url":492,"svn_tag_url":493,"released_at":38,"has_diff":50,"diff_files_changed":494,"diff_lines":38,"trac_diff_url":495,"vulnerabilities":496,"is_current":50},"1.4.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.1&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.2",[497],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":499,"download_url":500,"svn_tag_url":501,"released_at":38,"has_diff":50,"diff_files_changed":502,"diff_lines":38,"trac_diff_url":503,"vulnerabilities":504,"is_current":50},"1.4.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.4.0&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.1",[505],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":507,"download_url":508,"svn_tag_url":509,"released_at":38,"has_diff":50,"diff_files_changed":510,"diff_lines":38,"trac_diff_url":511,"vulnerabilities":512,"is_current":50},"1.4.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.4.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.4.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.33&new_path=%2Fstop-user-enumeration%2Ftags%2F1.4.0",[513],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":515,"download_url":516,"svn_tag_url":517,"released_at":38,"has_diff":50,"diff_files_changed":518,"diff_lines":38,"trac_diff_url":519,"vulnerabilities":520,"is_current":50},"1.3.33","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.33.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.33\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.32&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.33",[521],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":523,"download_url":524,"svn_tag_url":525,"released_at":38,"has_diff":50,"diff_files_changed":526,"diff_lines":38,"trac_diff_url":527,"vulnerabilities":528,"is_current":50},"1.3.32","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.32.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.32\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.31&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.32",[529],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":531,"download_url":532,"svn_tag_url":533,"released_at":38,"has_diff":50,"diff_files_changed":534,"diff_lines":38,"trac_diff_url":535,"vulnerabilities":536,"is_current":50},"1.3.31","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.31.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.31\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.30&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.31",[537],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":539,"download_url":540,"svn_tag_url":541,"released_at":38,"has_diff":50,"diff_files_changed":542,"diff_lines":38,"trac_diff_url":543,"vulnerabilities":544,"is_current":50},"1.3.30","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.30.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.30\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.29&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.30",[545],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":547,"download_url":548,"svn_tag_url":549,"released_at":38,"has_diff":50,"diff_files_changed":550,"diff_lines":38,"trac_diff_url":551,"vulnerabilities":552,"is_current":50},"1.3.29","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.29.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.29\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.28&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.29",[553],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":555,"download_url":556,"svn_tag_url":557,"released_at":38,"has_diff":50,"diff_files_changed":558,"diff_lines":38,"trac_diff_url":559,"vulnerabilities":560,"is_current":50},"1.3.28","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.28.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.28\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.27&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.28",[561],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":563,"download_url":564,"svn_tag_url":565,"released_at":38,"has_diff":50,"diff_files_changed":566,"diff_lines":38,"trac_diff_url":567,"vulnerabilities":568,"is_current":50},"1.3.27","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.27.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.27\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.26&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.27",[569],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":571,"download_url":572,"svn_tag_url":573,"released_at":38,"has_diff":50,"diff_files_changed":574,"diff_lines":38,"trac_diff_url":575,"vulnerabilities":576,"is_current":50},"1.3.26","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.26.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.26\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.25&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.26",[577],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":579,"download_url":580,"svn_tag_url":581,"released_at":38,"has_diff":50,"diff_files_changed":582,"diff_lines":38,"trac_diff_url":583,"vulnerabilities":584,"is_current":50},"1.3.25","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.25.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.25\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.24&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.25",[585],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":587,"download_url":588,"svn_tag_url":589,"released_at":38,"has_diff":50,"diff_files_changed":590,"diff_lines":38,"trac_diff_url":591,"vulnerabilities":592,"is_current":50},"1.3.24","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.24.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.24\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.23&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.24",[593],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":595,"download_url":596,"svn_tag_url":597,"released_at":38,"has_diff":50,"diff_files_changed":598,"diff_lines":38,"trac_diff_url":599,"vulnerabilities":600,"is_current":50},"1.3.23","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.23.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.23\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.22&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.23",[601],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":603,"download_url":604,"svn_tag_url":605,"released_at":38,"has_diff":50,"diff_files_changed":606,"diff_lines":38,"trac_diff_url":607,"vulnerabilities":608,"is_current":50},"1.3.22","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.22.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.22\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fstop-user-enumeration%2Ftags%2F1.3.20&new_path=%2Fstop-user-enumeration%2Ftags%2F1.3.22",[609],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40},{"version":57,"download_url":611,"svn_tag_url":612,"released_at":38,"has_diff":50,"diff_files_changed":613,"diff_lines":38,"trac_diff_url":38,"vulnerabilities":614,"is_current":50},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fstop-user-enumeration.1.3.20.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fstop-user-enumeration\u002Ftags\u002F1.3.20\u002F",[],[615],{"id":34,"url_slug":35,"title":36,"severity":41,"cvss_score":42,"vuln_type":44,"patched_in_version":40}]