[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fuensDDqG6qHle6djnkQ7QzJEAenpQVeSX-LAJdL8csY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-1472","better-find-and-replace-admin-sql-injection","Better Find and Replace \u003C= 1.3.5 - Admin+ SQL Injection","The Better Find and Replace WordPress plugin before 1.3.6 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection","real-time-auto-find-and-replace",null,"\u003C1.3.6","1.3.6","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2022-05-30 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe26b7e73-2d04-493a-a7d9-2276bc0e1ba8?source=api-prod",603]