[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6qN8qY-fvyTmdl2Om-YPWr_meOSUQAXyr69L-TKN0Wg":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-6592","fastdup-sensitive-information-exposure-via-directory-listing","FastDup \u003C= 2.1.9 - Sensitive Information Exposure via Directory Listing","The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.9. This makes it possible for unauthenticated attackers to obtain exports that include sensitive information such as user password hashes.","fastdup",null,"\u003C=2.1.9","2.2.0","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Exposure of Sensitive Information to an Unauthorized Actor","2024-01-16 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7fb646c4-6269-4354-b3a6-872c6303a6d2?source=api-prod",7]