[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f2qJhA0LucAlkKGIKiBbEOWN_r0Eyguj3aQJ6EvAVtzA":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-28850","wp-crontrol-remote-code-execution","WP Crontrol \u003C= 1.16.1 - Remote Code Execution","The WP Crontrol plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.1 when another vulnerability is present on the site that allows access to editing the database. This makes it possible for attackers to execute code on the server. Please see the advisory in references for more in depth details.","wp-crontrol",null,"\u003C=1.16.1","1.16.2","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Download of Code Without Integrity Check","2024-03-24 00:00:00","2025-04-25 20:51:51",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1b0c1afc-0e77-4a56-89cb-84e2fcc8aa21?source=api-prod",398]