[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fJRiddVYXIi7ANfsR0XehNjC84e-6SMtaI_NogG3ts4U":3,"$f7JLKyOxTsaHswpNnX_YPEKvdgFoX6SxAHHq8tLM2MW0":304,"$fGuP-Yyvfz93v9DXfosTLheHJ0iAA-WWr2xf2fkF8he0":308},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":29,"last_vuln_date":30,"fetched_at":31,"discovery_status":32,"vulnerabilities":33,"developer":123,"crawl_stats":39,"alternatives":131,"analysis":132,"fingerprints":262},"tracking-code-manager","Tracking Code Manager","2.5.0","Data443 Risk Mitigation, Inc.","https:\u002F\u002Fprofiles.wordpress.org\u002Fdata443\u002F","\u003Cp>\u003Cstrong>Tracking Code manager is a plugin that give you the ability to manage ALL third party tracking codes and scripts in one single interface.\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>This plugin is a service of \u003Ca href=\"https:\u002F\u002Fwww.data443.com\" rel=\"nofollow ugc\">Data443.com\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Data443 is a Data Security and Privacy Compliance company that is publicly traded \u003Ca href=\"https:\u002F\u002Ffinance.yahoo.com\u002Fquote\u002FATDS?p=ATD\" rel=\"nofollow ugc\">ATDS\u003C\u002Fa>.  We have been providing leading GDPR compliance products such as \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fgdpr-framework\u002F\" rel=\"nofollow ugc\">WordPress GDPR Framework\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fdata443.com\u002Fproducts\u002Fdata-identification-manager\u002F\" rel=\"nofollow ugc\">Data Identification Manager\u003C\u002Fa>, Blockchain privacy, and enterprise cloud eDiscovery tools.\u003C\u002Fp>\n\u003Cp>It doesn’t matter where you want to put the codes, because with Tracking Code Manager you can place the codes on any page, any location with complete freedom.  Maintain compliance with worldwide privacy laws by segmenting your pixel tracking, blocking by country or location if you wish.  Remove or update pixels quickly with a single mouse click.\u003C\u002Fp>\n\u003Cp>Very quickly add custom codes for world leading user enhancement platforms like Google Analytics, Facebook Custom Audiences, Facebook Retargeting, Google Remarketing, Zendesk, Live Chat tools, eye tracking analytics, popups, affiliate tracking pixels and so on…\u003C\u002Fp>\n\u003Cp>For every single service you may use – or even test – you’ll have to put a script or a tracking pixel in the \u003Chead> or \u003Cbody> tag of your WordPress site OR in some of its pages. Manually.  You may even break pages or themes!\u003C\u002Fp>\n\u003Cp>Maintin privacy compliance for your users by removing tags for certain locations, pages or types of content.  Make advanced decisions based privacy laws that apply to your region!\u003C\u002Fp>\n\u003Cp>Tracking Code Manager plugin allows you to gather EVERY code and snippet displaying them exactly where you want, whether in the whole site or in specific pages and posts. Very quickly, simply.  More importantly, you will be able to remove them just as quickly – without any fuss.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>TRACK CONVERSION ON YOUR E-COMMERCE PLUGIN\u003C\u002Fstrong>\u003Cbr \u002F>\n  When it comes to track conversions on a WordPress page it’s easy… but if it’s a “dynamic thank you page” is a big problem.\u003C\u002Fp>\n\u003Cp>  Tracking Code Manager plugin DETECT AUTOMATICALLY your e-commerce plugin (WooCommerce, Easy Digital Downloads or WP eCommerce) and let you put the conversion pixels every time someone completes a sale on your store.\u003Cbr \u002F>\n  In addition you also have the ability to track a single product at time 😉\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Ftracking-code-manager\u002Fscreenshots\u002F\" rel=\"ugc\">Check some screenshots here.\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>THE REAL PROBLEM\u003C\u002Fh4>\n\u003Cp>Since almost every service requires some sort of tracking, update, javascript update or other customization – you can make it extremely simply with this plugin – the fast Tracking Code Manager plugin.\u003C\u002Fp>\n\u003Ch4>FORGET THE UPDATING PROBLEM\u003C\u002Fh4>\n\u003Cp>Its very easy to break your site!  Putting the tracking code directly in the theme files, you risk to lose important trackings or external service integrations when it will be updated.  We have all been there!\u003C\u002Fp>\n\u003Cp>With Tracking Code Manager you can forget about this problem also if you will change your theme in the future.  Because we are external to the theme – you have reduced your risk between updates to WordPress and any themes or plugin updates.\u003C\u002Fp>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FshJG7Vf1nMg?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FTDgoefbdtSI?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\n\u003Cblockquote>\n\u003Cp>\u003Cstrong>Premium version\u003C\u002Fstrong>\u003Cbr \u002F>\n  If you need more advanced feature you can also try our PREMIUM version available in the link \u003Ca href=\"http:\u002F\u002Fintellywp.com\u002Ftracking-code-manager\u002F?utm_source=wordpress-org&utm_medium=plugin-page&utm_campaign=TCM\" rel=\"nofollow ugc\">http:\u002F\u002Fintellywp.com\u002Ftracking-code-manager\u002F\u003C\u002Fa>. This is our official webpage, you will see the plugin in action, with the possibility to buy our PREMIUM version and which includes full support.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n","A plugin to manage ALL of your tracking code and conversion pixels. Compatible with Facebook Ads, Google Adwords, WooCommerce, Easy Digital Downloads, &hellip;",90000,2545595,82,58,"2025-06-16T18:07:00.000Z","6.8.5","3.6.0","5.6",[20,21,22,23,24],"deliver-content-by-ad","map-google-ads","profit-google-ad","track-google-ad","utm-management","http:\u002F\u002Fintellywp.com\u002Ftracking-code-manager\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.zip",96,6,0,"2024-12-23 00:00:00","2026-04-16T10:56:18.058Z","no_bundle",[34,52,67,83,96,111],{"id":35,"url_slug":36,"title":37,"description":38,"plugin_slug":4,"theme_slug":39,"affected_versions":40,"patched_in_version":41,"severity":42,"cvss_score":43,"cvss_vector":44,"vuln_type":45,"published_date":30,"updated_date":46,"references":47,"days_to_patch":49,"patch_diff_files":50,"patch_trac_url":39,"research_status":39,"research_verified":51,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":51,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-8721","tracking-code-manager-authenticated-contributor-stored-cross-site-scripting","Tracking Code Manager \u003C= 2.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting","The Tracking Code Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the tracking code field in all versions up to, and including, 2.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-10309 is a duplicate of this issue.",null,"\u003C=2.3.0","2.4.0","medium",6.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2025-02-19 16:32:59",[48],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F443d2e80-31db-40ac-9c35-88eec841ebba?source=api-prod",59,[],false,{"id":53,"url_slug":54,"title":55,"description":56,"plugin_slug":4,"theme_slug":39,"affected_versions":57,"patched_in_version":58,"severity":42,"cvss_score":59,"cvss_vector":60,"vuln_type":45,"published_date":61,"updated_date":62,"references":63,"days_to_patch":65,"patch_diff_files":66,"patch_trac_url":39,"research_status":39,"research_verified":51,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":51,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-6335","tracking-code-manager-authenticated-administrator-stored-cross-site-scripting","Tracking Code Manager \u003C= 2.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting","The Tracking Code Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.","\u003C=2.2.0","2.3.0",4.4,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","2024-06-03 00:00:00","2024-09-10 17:08:20",[64],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F9bd1fe45-8518-429b-94d3-cc0ea06ca1b4?source=api-prod",100,[],{"id":68,"url_slug":69,"title":70,"description":71,"plugin_slug":4,"theme_slug":39,"affected_versions":72,"patched_in_version":73,"severity":42,"cvss_score":74,"cvss_vector":75,"vuln_type":76,"published_date":77,"updated_date":78,"references":79,"days_to_patch":81,"patch_diff_files":82,"patch_trac_url":39,"research_status":39,"research_verified":51,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":51,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-31347","tracking-code-manager-missing-authorization-via-changeorder","Tracking Code Manager \u003C= 2.1.0 - Missing Authorization via change_order()","The Tracking Code Manager plugin for WordPress is vulnerable to unauthorized modification due to a missing capability check on the change_order() function in versions up to, and including, 2.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to change the order of a menu.","\u003C=2.1.0","2.2.0",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Missing Authorization","2024-04-05 00:00:00","2024-04-11 13:59:32",[80],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0d54e5ad-0a97-4dd4-b53b-ad3f885dc506?source=api-prod",7,[],{"id":84,"url_slug":85,"title":86,"description":87,"plugin_slug":4,"theme_slug":39,"affected_versions":88,"patched_in_version":89,"severity":42,"cvss_score":59,"cvss_vector":60,"vuln_type":45,"published_date":90,"updated_date":91,"references":92,"days_to_patch":94,"patch_diff_files":95,"patch_trac_url":39,"research_status":39,"research_verified":51,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":51,"poc_model_used":39,"poc_verification_depth":39},"CVE-2024-2579","tracking-code-manager-authenticated-administrator-stored-cross-site-scripting-2","Tracking Code Manager \u003C= 2.0.16 - Authenticated (Administrator+) Stored Cross-Site Scripting","The Tracking Code Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.0.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.","\u003C=2.0.16","2.1.0","2024-03-18 00:00:00","2024-03-22 15:03:39",[93],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa0c962ba-43ef-4713-acd9-1e499f857df8?source=api-prod",5,[],{"id":97,"url_slug":98,"title":99,"description":100,"plugin_slug":4,"theme_slug":39,"affected_versions":101,"patched_in_version":102,"severity":42,"cvss_score":103,"cvss_vector":104,"vuln_type":45,"published_date":105,"updated_date":106,"references":107,"days_to_patch":109,"patch_diff_files":110,"patch_trac_url":39,"research_status":39,"research_verified":51,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":51,"poc_model_used":39,"poc_verification_depth":39},"WF-8f52fd57-abfe-48c4-a950-66d72a5a9627-tracking-code-manager","tracking-code-manager-cross-site-scripting","Tracking Code Manager \u003C 1.11.5 - Cross-Site Scripting","The Tracking Code Manager for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tcmp_action’ parameter in versions up to, and including, 1.11.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.","\u003C=1.11.4","1.11.5",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","2017-05-10 00:00:00","2024-01-22 19:56:02",[108],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8f52fd57-abfe-48c4-a950-66d72a5a9627?source=api-prod",2449,[],{"id":112,"url_slug":113,"title":114,"description":115,"plugin_slug":4,"theme_slug":39,"affected_versions":101,"patched_in_version":102,"severity":116,"cvss_score":117,"cvss_vector":118,"vuln_type":119,"published_date":105,"updated_date":106,"references":120,"days_to_patch":109,"patch_diff_files":122,"patch_trac_url":39,"research_status":39,"research_verified":51,"research_rounds_completed":29,"research_plan":39,"research_summary":39,"research_vulnerable_code":39,"research_fix_diff":39,"research_exploit_outline":39,"research_model_used":39,"research_started_at":39,"research_completed_at":39,"research_error":39,"poc_status":39,"poc_video_id":39,"poc_summary":39,"poc_steps":39,"poc_tested_at":39,"poc_wp_version":39,"poc_php_version":39,"poc_playwright_script":39,"poc_exploit_code":39,"poc_has_trace":51,"poc_model_used":39,"poc_verification_depth":39},"WF-99418bd5-041a-4210-9571-fee6842fb692-tracking-code-manager","tracking-code-manager-denial-of-service","Tracking Code Manager \u003C 1.11.5 - Denial of Service","The Tracking Code Manager for WordPress is vulnerable to Denial of Service attacks in versions up to, and including, 1.11.4. This is due to the ability of users to make a recursive call to the 'tcmp_do_action' function. Due to an additional Cross-Site Request Forgery vulnerability, this makes it possible for unauthenticated attackers to render a site unresponsive until a restart.","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:N\u002FA:H","Uncontrolled Resource Consumption",[121],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F99418bd5-041a-4210-9571-fee6842fb692?source=api-prod",[],{"slug":124,"display_name":7,"profile_url":8,"plugin_count":125,"total_installs":126,"avg_security_score":127,"avg_patch_time_days":128,"trust_score":129,"computed_at":130},"data443",11,202600,83,411,67,"2026-05-19T18:31:19.038Z",[],{"attackSurface":133,"codeSignals":230,"taintFlows":252,"riskAssessment":253,"analyzedAt":261},{"hooks":134,"ajaxHandlers":209,"restRoutes":215,"shortcodes":216,"cronEvents":224,"entryPointCount":186,"unprotectedCount":29},[135,141,145,150,154,158,162,166,170,173,177,182,187,191,195,199,204],{"type":136,"name":137,"callback":138,"file":139,"line":140},"action","add_meta_boxes","tcmp_add_meta_box","includes\\admin\\metabox.php",74,{"type":136,"name":142,"callback":143,"file":139,"line":144},"save_post","tcmp_save_meta_box_data",129,{"type":136,"name":146,"callback":147,"file":148,"line":149},"admin_menu","attach_menu","includes\\classes\\ui\\Tabs.php",10,{"type":151,"name":152,"callback":153,"priority":149,"file":148,"line":125},"filter","plugin_action_links","plugin_actions",{"type":136,"name":155,"callback":156,"file":148,"line":157},"admin_enqueue_scripts","enqueue_scripts",13,{"type":151,"name":159,"callback":160,"file":161,"line":125},"cron_schedules","add_schedules","includes\\classes\\utils\\Cron.php",{"type":136,"name":163,"callback":164,"file":161,"line":165},"wp","schedule_Events",12,{"type":136,"name":167,"callback":168,"file":169,"line":149},"woocommerce_thankyou","wooCommerceThankYou","includes\\classes\\utils\\Ecommerce.php",{"type":136,"name":171,"callback":172,"file":169,"line":157},"edd_payment_receipt_after_table","eddThankYou",{"type":136,"name":174,"callback":175,"file":169,"line":176},"wpsc_transaction_result_cart_item","eCommerceThankYou",14,{"type":136,"name":178,"callback":179,"file":180,"line":181},"tcmp_weekly_scheduled_events","sendTracking","includes\\classes\\utils\\Tracking.php",20,{"type":151,"name":183,"callback":184,"file":185,"line":186},"wp_head","tcmp_head","includes\\core.php",3,{"type":136,"name":188,"callback":189,"file":185,"line":190},"wp_body_open","tcmp_body",23,{"type":136,"name":192,"callback":193,"file":185,"line":194},"wp_footer","tcmp_footer",31,{"type":151,"name":196,"callback":197,"file":185,"line":198},"admin_footer","tcmp_admin_footer",79,{"type":136,"name":200,"callback":201,"file":202,"line":203},"admin_init","tcmp_first_redirect","includes\\install.php",16,{"type":151,"name":205,"callback":206,"file":207,"line":208},"jetpack_shortcodes_to_include","tcmp_free_jetpack_shortcode_callback","tcmp_free_wp_kses_tags_attrs.php",154,[210],{"action":211,"nopriv":51,"callback":212,"hasNonce":213,"hasCapCheck":213,"file":214,"line":149},"TCMP_changeOrder","change_order",true,"includes\\classes\\core\\Manager.php",[],[217,221],{"tag":218,"callback":219,"file":185,"line":220},"tcmp","tcmp_shortcode",51,{"tag":222,"callback":219,"file":185,"line":223},"tcm",52,[225,227],{"hook":178,"callback":178,"file":161,"line":226},30,{"hook":228,"callback":228,"file":161,"line":229},"tcmp_daily_scheduled_events",35,{"dangerousFunctions":231,"sqlUsage":232,"outputEscaping":234,"fileOperations":94,"externalRequests":246,"nonceChecks":28,"capabilityChecks":236,"bundledLibraries":247},[],{"prepared":149,"raw":29,"locations":233},[],{"escaped":235,"rawEcho":236,"locations":237},248,4,[238,240,242,245],{"file":139,"line":226,"context":239},"raw output",{"file":214,"line":241,"context":239},353,{"file":243,"line":244,"context":239},"includes\\classes\\utils\\Options.php",371,{"file":243,"line":244,"context":239},1,[248],{"name":249,"version":250,"knownCves":251},"Select2","4.0.13",[],[],{"summary":254,"deductions":255},"The \"tracking-code-manager\" plugin v2.5.0 exhibits a generally good security posture based on the static analysis. The plugin demonstrates strong adherence to secure coding practices, with 100% of SQL queries utilizing prepared statements and an impressive 98% of output being properly escaped.  The limited attack surface, with no unprotected entry points found in AJAX handlers, REST API routes, or shortcodes, is also a positive indicator. The plugin also implements a healthy number of nonce and capability checks, further strengthening its defenses.\n\nHowever, the vulnerability history presents a significant concern. With a total of six known CVEs, including one high-severity and five medium-severity vulnerabilities, this indicates a recurring pattern of security weaknesses that have required attention in the past. While there are no currently unpatched vulnerabilities, the types of past issues – Cross-site Scripting, Missing Authorization, and Uncontrolled Resource Consumption – are serious and could indicate underlying architectural flaws or a tendency to introduce such issues in development. The presence of an outdated bundled library (Select2 v4.0.13) is a minor but noteworthy concern, as older versions can harbor known vulnerabilities.\n\nIn conclusion, while the static analysis shows commendable coding practices and a controlled attack surface, the plugin's past vulnerability record necessitates caution. The plugin has strengths in its secure SQL handling and output escaping, but its history suggests a need for continued vigilance and thorough security reviews to prevent the recurrence of past issues. The outdated bundled library is a minor point of attention but doesn't detract significantly from the overall assessment given the other positive indicators.",[256,258],{"reason":257,"points":186},"Bundled outdated library (Select2 v4.0.13)",{"reason":259,"points":260},"History of 6 CVEs (1 high, 5 medium)",15,"2026-03-16T17:09:42.607Z",{"wat":263,"direct":292},{"assetPaths":264,"generatorPatterns":277,"scriptPaths":278,"versionParams":279},[265,266,267,268,269,270,271,272,273,274,275,276],"\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fcss\u002Fstyle.css","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fcss\u002Fmanager.css","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fdeps\u002Fselect2-4.0.13\u002Fselect2.css","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fdeps\u002Fselect2-4.0.13\u002Fselect2.full.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fdeps\u002Fstarrr\u002Fstarrr.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fjs\u002Flibrary.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fjs\u002Fplugin.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fjs\u002Feditor.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fjs\u002Fmanager.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fjs\u002Fdelete-confirm.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fjs\u002Face\u002Face.js","\u002Fwp-content\u002Fplugins\u002Ftracking-code-manager\u002Fassets\u002Fcss\u002Ffont-awesome.min.css",[],[268,269,270,271,272,273,274,275],[280,281,282,283,284,285,286,287,288,289,290,291],"tracking-code-manager\u002Fassets\u002Fcss\u002Fstyle.css?v=","tracking-code-manager\u002Fassets\u002Fcss\u002Fmanager.css?v=","tracking-code-manager\u002Fassets\u002Fdeps\u002Fselect2-4.0.13\u002Fselect2.css?v=","tracking-code-manager\u002Fassets\u002Fdeps\u002Fselect2-4.0.13\u002Fselect2.full.js?v=","tracking-code-manager\u002Fassets\u002Fdeps\u002Fstarrr\u002Fstarrr.js?v=","tracking-code-manager\u002Fassets\u002Fjs\u002Flibrary.js?v=","tracking-code-manager\u002Fassets\u002Fjs\u002Fplugin.js?v=","tracking-code-manager\u002Fassets\u002Fjs\u002Feditor.js?v=","tracking-code-manager\u002Fassets\u002Fjs\u002Fmanager.js?v=","tracking-code-manager\u002Fassets\u002Fjs\u002Fdelete-confirm.js?v=","tracking-code-manager\u002Fassets\u002Fjs\u002Face\u002Face.js?v=","tracking-code-manager\u002Fassets\u002Fcss\u002Ffont-awesome.min.css?v=",{"cssClasses":293,"htmlComments":294,"htmlAttributes":297,"restEndpoints":299,"jsGlobals":300,"shortcodeOutput":303},[],[295,296],"\u003C!-- Tracking Code Manager: Start -->","\u003C!-- Tracking Code Manager: End -->",[298],"data-tcmp-editor-id",[],[301,302],"TCMP__manager","delete_data",[],{"error":213,"url":305,"statusCode":306,"statusMessage":307,"message":307},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Ftracking-code-manager\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":309,"versions":310},25,[311,317,323,330,338,347,358,369,380,391,402,413,424,435,446,457,468,479,490,501,512,523,534,545,558],{"version":6,"download_url":312,"svn_tag_url":313,"released_at":39,"has_diff":51,"diff_files_changed":314,"diff_lines":39,"trac_diff_url":315,"vulnerabilities":316,"is_current":213},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.5.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.5.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.4.0&new_path=%2Ftracking-code-manager%2Ftags%2F2.5.0",[],{"version":41,"download_url":318,"svn_tag_url":319,"released_at":39,"has_diff":51,"diff_files_changed":320,"diff_lines":39,"trac_diff_url":321,"vulnerabilities":322,"is_current":51},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.4.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.4.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.3.0&new_path=%2Ftracking-code-manager%2Ftags%2F2.4.0",[],{"version":58,"download_url":324,"svn_tag_url":325,"released_at":39,"has_diff":51,"diff_files_changed":326,"diff_lines":39,"trac_diff_url":327,"vulnerabilities":328,"is_current":51},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.3.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.3.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.2.0&new_path=%2Ftracking-code-manager%2Ftags%2F2.3.0",[329],{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"version":73,"download_url":331,"svn_tag_url":332,"released_at":39,"has_diff":51,"diff_files_changed":333,"diff_lines":39,"trac_diff_url":334,"vulnerabilities":335,"is_current":51},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.2.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.2.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.1.0&new_path=%2Ftracking-code-manager%2Ftags%2F2.2.0",[336,337],{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"version":89,"download_url":339,"svn_tag_url":340,"released_at":39,"has_diff":51,"diff_files_changed":341,"diff_lines":39,"trac_diff_url":342,"vulnerabilities":343,"is_current":51},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.1.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.16&new_path=%2Ftracking-code-manager%2Ftags%2F2.1.0",[344,345,346],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"version":348,"download_url":349,"svn_tag_url":350,"released_at":39,"has_diff":51,"diff_files_changed":351,"diff_lines":39,"trac_diff_url":352,"vulnerabilities":353,"is_current":51},"2.0.16","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.16.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.16\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.15&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.16",[354,355,356,357],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":359,"download_url":360,"svn_tag_url":361,"released_at":39,"has_diff":51,"diff_files_changed":362,"diff_lines":39,"trac_diff_url":363,"vulnerabilities":364,"is_current":51},"2.0.15","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.15.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.15\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.14&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.15",[365,366,367,368],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":370,"download_url":371,"svn_tag_url":372,"released_at":39,"has_diff":51,"diff_files_changed":373,"diff_lines":39,"trac_diff_url":374,"vulnerabilities":375,"is_current":51},"2.0.14","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.14.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.14\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.13&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.14",[376,377,378,379],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":381,"download_url":382,"svn_tag_url":383,"released_at":39,"has_diff":51,"diff_files_changed":384,"diff_lines":39,"trac_diff_url":385,"vulnerabilities":386,"is_current":51},"2.0.13","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.13.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.13\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.7&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.13",[387,388,389,390],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":392,"download_url":393,"svn_tag_url":394,"released_at":39,"has_diff":51,"diff_files_changed":395,"diff_lines":39,"trac_diff_url":396,"vulnerabilities":397,"is_current":51},"2.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.6&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.7",[398,399,400,401],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":403,"download_url":404,"svn_tag_url":405,"released_at":39,"has_diff":51,"diff_files_changed":406,"diff_lines":39,"trac_diff_url":407,"vulnerabilities":408,"is_current":51},"2.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.5&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.6",[409,410,411,412],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":414,"download_url":415,"svn_tag_url":416,"released_at":39,"has_diff":51,"diff_files_changed":417,"diff_lines":39,"trac_diff_url":418,"vulnerabilities":419,"is_current":51},"2.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.4&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.5",[420,421,422,423],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":425,"download_url":426,"svn_tag_url":427,"released_at":39,"has_diff":51,"diff_files_changed":428,"diff_lines":39,"trac_diff_url":429,"vulnerabilities":430,"is_current":51},"2.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.3&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.4",[431,432,433,434],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":436,"download_url":437,"svn_tag_url":438,"released_at":39,"has_diff":51,"diff_files_changed":439,"diff_lines":39,"trac_diff_url":440,"vulnerabilities":441,"is_current":51},"2.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.2&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.3",[442,443,444,445],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":447,"download_url":448,"svn_tag_url":449,"released_at":39,"has_diff":51,"diff_files_changed":450,"diff_lines":39,"trac_diff_url":451,"vulnerabilities":452,"is_current":51},"2.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.1&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.2",[453,454,455,456],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":458,"download_url":459,"svn_tag_url":460,"released_at":39,"has_diff":51,"diff_files_changed":461,"diff_lines":39,"trac_diff_url":462,"vulnerabilities":463,"is_current":51},"2.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F2.0.0&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.1",[464,465,466,467],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":469,"download_url":470,"svn_tag_url":471,"released_at":39,"has_diff":51,"diff_files_changed":472,"diff_lines":39,"trac_diff_url":473,"vulnerabilities":474,"is_current":51},"2.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.2.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F2.0.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.12.3&new_path=%2Ftracking-code-manager%2Ftags%2F2.0.0",[475,476,477,478],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":480,"download_url":481,"svn_tag_url":482,"released_at":39,"has_diff":51,"diff_files_changed":483,"diff_lines":39,"trac_diff_url":484,"vulnerabilities":485,"is_current":51},"1.12.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.12.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.12.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.12.2&new_path=%2Ftracking-code-manager%2Ftags%2F1.12.3",[486,487,488,489],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":491,"download_url":492,"svn_tag_url":493,"released_at":39,"has_diff":51,"diff_files_changed":494,"diff_lines":39,"trac_diff_url":495,"vulnerabilities":496,"is_current":51},"1.12.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.12.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.12.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.12.1&new_path=%2Ftracking-code-manager%2Ftags%2F1.12.2",[497,498,499,500],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":502,"download_url":503,"svn_tag_url":504,"released_at":39,"has_diff":51,"diff_files_changed":505,"diff_lines":39,"trac_diff_url":506,"vulnerabilities":507,"is_current":51},"1.12.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.12.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.12.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.12.0&new_path=%2Ftracking-code-manager%2Ftags%2F1.12.1",[508,509,510,511],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":513,"download_url":514,"svn_tag_url":515,"released_at":39,"has_diff":51,"diff_files_changed":516,"diff_lines":39,"trac_diff_url":517,"vulnerabilities":518,"is_current":51},"1.12.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.12.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.12.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.11.9&new_path=%2Ftracking-code-manager%2Ftags%2F1.12.0",[519,520,521,522],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":524,"download_url":525,"svn_tag_url":526,"released_at":39,"has_diff":51,"diff_files_changed":527,"diff_lines":39,"trac_diff_url":528,"vulnerabilities":529,"is_current":51},"1.11.9","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.11.9.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.11.9\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.11.8&new_path=%2Ftracking-code-manager%2Ftags%2F1.11.9",[530,531,532,533],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":535,"download_url":536,"svn_tag_url":537,"released_at":39,"has_diff":51,"diff_files_changed":538,"diff_lines":39,"trac_diff_url":539,"vulnerabilities":540,"is_current":51},"1.11.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.11.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.11.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.5&new_path=%2Ftracking-code-manager%2Ftags%2F1.11.8",[541,542,543,544],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":546,"download_url":547,"svn_tag_url":548,"released_at":39,"has_diff":51,"diff_files_changed":549,"diff_lines":39,"trac_diff_url":550,"vulnerabilities":551,"is_current":51},"1.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Ftracking-code-manager%2Ftags%2F1.4&new_path=%2Ftracking-code-manager%2Ftags%2F1.5",[552,553,554,555,556,557],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":97,"url_slug":98,"title":99,"severity":42,"cvss_score":103,"vuln_type":45,"patched_in_version":102},{"id":112,"url_slug":113,"title":114,"severity":116,"cvss_score":117,"vuln_type":119,"patched_in_version":102},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89},{"version":559,"download_url":560,"svn_tag_url":561,"released_at":39,"has_diff":51,"diff_files_changed":562,"diff_lines":39,"trac_diff_url":39,"vulnerabilities":563,"is_current":51},"1.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftracking-code-manager.1.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Ftracking-code-manager\u002Ftags\u002F1.4\u002F",[],[564,565,566,567,568,569],{"id":68,"url_slug":69,"title":70,"severity":42,"cvss_score":74,"vuln_type":76,"patched_in_version":73},{"id":35,"url_slug":36,"title":37,"severity":42,"cvss_score":43,"vuln_type":45,"patched_in_version":41},{"id":97,"url_slug":98,"title":99,"severity":42,"cvss_score":103,"vuln_type":45,"patched_in_version":102},{"id":112,"url_slug":113,"title":114,"severity":116,"cvss_score":117,"vuln_type":119,"patched_in_version":102},{"id":53,"url_slug":54,"title":55,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":58},{"id":84,"url_slug":85,"title":86,"severity":42,"cvss_score":59,"vuln_type":45,"patched_in_version":89}]