[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f2FdtHD1W75bPguc-gjad45nmZ6Zm4WKFJYfOwf2f2ZE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2014-8749","bulletproof-security-server-side-request-forgery","BulletProof Security \u003C .51.1 - Server-Side Request Forgery","Server-side request forgery (SSRF) vulnerability in admin\u002Fhtaccess\u002Fbpsunlock.php in the BulletProof Security plugin before .51.1 for WordPress allows remote attackers to trigger outbound requests that authenticate to arbitrary databases via the dbhost parameter.","bulletproof-security",null,"\u003C=.51",".51.1","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Server-Side Request Forgery (SSRF)","2014-11-05 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fecf73f3a-5f7b-4ef4-a31a-f282b953f294?source=api-prod",3366]