[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fsvgdF_l_N89ZoTdNKS5pfIhMoRNU0j7S3wtK63gcyk0":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-33987","got-js-package-and-open-redirect","got (JS Package) \u003C= 11.8.4 and 12.0-\u003C12.1.0 - Open Redirect","The got (JS Package) is vulnerable to Open Redirect in versions up to, and including, 11.8.4 as well as from 12 to below 12.1.0. Requested URLs are not verified and allow open redirection to a local UNIX socket.","safe-redirect-manager",null,"\u003C=1.11.1","2.0.0","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","URL Redirection to Untrusted Site ('Open Redirect')","2022-06-19 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F47681954-37ed-493b-b4da-9e9032e561b3?source=api-prod",583]