[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feV2qPN-tzCFaOyqtEC5AGvB5vKiRH3zpYUh9VFk5bRY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2014-9511","sell-downloads-arbitrary-file-read","Sell Downloads \u003C= 1.0.1 - Arbitrary File Read","The Sell Downloads plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 1.0.1 via the 'file' parameter. This can allow unauthenticated attackers to extract sensitive data such as settings\u002Fconfiguration files along with other useful information that can be used in future attacks.","sell-downloads",null,"\u003C=1.0.1","1.0.2","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2014-12-29 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F72d9efad-9afd-4d7a-a1dd-7623a9e5a7db?source=api-prod",3312]