[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fyTcH2j5-iRPSJbyH5uuBXJeJMlsBTotInFYzjvK-n_Q":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-f71ab7bb-886a-4661-92b5-d9ac52901494-download-monitor","download-monitor-directory-listing-to-information-disclosure","Download Monitor \u003C= 1.6.3 - Directory Listing to Information Disclosure","The Download Monitor plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 1.6.3 via the 'dir' parameter. This can allow authenticated attackers to extract sensitive data including directories and otherwise restricted server-side filenames.","download-monitor",null,"\u003C=1.6.3","1.6.4","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2015-03-08 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff71ab7bb-886a-4661-92b5-d9ac52901494?source=api-prod",3243]