[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fwuoPVXUoR_35XF8rYS4fFshyHFQFWF_n9cZYoQSlxoU":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-45842","wp-ulike-race-condition","WP ULike \u003C= 4.6.4 - Race Condition","The WP ULike plugin for WordPress is vulnerable to Race Condition in versions up to, and including, 4.6.4. This can lead to unpredictable post rating changes when certain conditions are met.","wp-ulike",null,"\u003C=4.6.4","4.6.5","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","2022-11-24 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F3d5ee8f1-8d86-4af0-af01-b31d2ff993d1?source=api-prod",425]