[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f8yvZfMcEjBGvb_ADQiZu9CjZquzAlfLULz-spKVjrfM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":9,"severity":11,"cvss_score":12,"cvss_vector":13,"vuln_type":14,"published_date":15,"updated_date":16,"references":17,"days_to_patch":9},"WF-f34383c7-1d98-4f8a-aa43-542fe2d9a567-starbox-voting","starbox-voting-full-path-disclosure","Starbox Voting \u003C= 2.0.4 - Full Path Disclosure","The Starbox Voting plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 2.0.4 via error handling. This can allow unauthenticated attackers to extract sensitive data including the full path of the WordPress installation","starbox-voting",null,"\u003C=2.0.4","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2011-02-22 00:00:00","2024-01-22 19:56:02",[18],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff34383c7-1d98-4f8a-aa43-542fe2d9a567?source=api-prod"]