[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fohM0Fm1BEGOxKJlA1zsSZ48sFfmhGh3RSZro-pz5BRs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20,"patch_diff_files":21,"patch_trac_url":9,"research_status":9,"research_verified":22,"research_rounds_completed":23,"research_plan":9,"research_summary":9,"research_vulnerable_code":9,"research_fix_diff":9,"research_exploit_outline":9,"research_model_used":9,"research_started_at":9,"research_completed_at":9,"research_error":9,"poc_status":9,"poc_video_id":9,"poc_summary":9,"poc_steps":9,"poc_tested_at":9,"poc_wp_version":9,"poc_php_version":9,"poc_playwright_script":9,"poc_exploit_code":9,"poc_has_trace":22,"poc_model_used":9,"poc_verification_depth":9,"poc_exploit_code_gated":22,"source_links":24},"CVE-2021-4226","rsfirewall-ip-address-spoofing","RSFirewall! \u003C= 1.1.24 - IP Address Spoofing","The RSFirewall! plugin for WordPress is vulnerable to IP Address Spoofing in versions less than and equal to 1.1.24 due to insufficient IP address validation. This makes it possible for attackers to bypass blocks and access services they should not be able to.","rsfirewall",null,"\u003C=1.1.24","1.1.25","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:N","Use of Less Trusted Source","2022-04-13 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F64f43aee-01ee-4fbb-a174-966ed3c06b21?source=api-prod",650,[],false,0,{"type":25,"vulnerable_version":9,"fixed_version":9,"vulnerable_browse":9,"vulnerable_zip":9,"fixed_browse":9,"fixed_zip":9,"all_tags":26},"plugin","https:\u002F\u002Fplugins.trac.wordpress.org\u002Fbrowser\u002Frsfirewall\u002Ftags"]