{"id":4260,"date":"2024-07-10T14:45:10","date_gmt":"2024-07-10T14:45:10","guid":{"rendered":"http:\/\/127.0.0.1\/duplicator-1-5-9-divulgacion-de-ruta-completa\/"},"modified":"2024-07-10T14:45:10","modified_gmt":"2024-07-10T14:45:10","slug":"duplicator-1-5-9-divulgacion-de-ruta-completa","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/duplicator-1-5-9-divulgacion-de-ruta-completa\/","title":{"rendered":"Duplicator <= 1.5.9 – Divulgaci\u00f3n de Ruta Completa"},"content":{"rendered":"
<\/p>\n
El plugin Duplicator para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta, e incluyendo, la 1.5.9. Esto permite que atacantes no autenticados obtengan la ruta completa a las instancias, lo cual podr\u00edan utilizar en combinaci\u00f3n con otras vulnerabilidades o para facilitar el trabajo de reconocimiento. Por s\u00ed sola, esta informaci\u00f3n […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1968],"class_list":["post-4260","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6210"],"yoast_head":"\n