[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fVvRwoINcL0qSYNjQ7TpLi8A_WidvF76LB_xPQVTkYQ4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-13981037-e698-42a7-9471-e27486cf1a4e-wp-super-cache","wp-super-cache-directory-listing","WP Super Cache \u003C= 1.4.4 - Directory Listing","The WP Super Cache plugin for WordPress is vulnerable to Directory Listing in versions up to, and including, 1.4.4. This allows unauthenticated attackers to read the contents of arbitrary directories on the server, which can contain sensitive information.","wp-super-cache",null,"\u003C1.4.5","1.4.5","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Information Through Directory Listing","2015-09-25 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F13981037-e698-42a7-9471-e27486cf1a4e?source=api-prod",3042]