--- http_interactions: - request: method: get uri: https://wpvulndb.com/api/v2/plugins/relevanssi body: encoding: US-ASCII string: '' headers: Accept-Encoding: - gzip;q=1.0,deflate;q=0.6,identity;q=0.3 Accept: - "*/*" User-Agent: - Ruby response: status: code: 200 message: OK headers: Server: - nginx Date: - Mon, 23 May 2016 13:00:57 GMT Content-Type: - application/json; charset=utf-8 Transfer-Encoding: - chunked Connection: - keep-alive Vary: - Accept-Encoding Cache-Control: - max-age=0, private, must-revalidate X-Request-Id: - 8da0a81f-dfe0-493e-bb99-55486456834f Strict-Transport-Security: - max-age=63072000; includeSubDomains; preload X-Frame-Options: - SAMEORIGIN X-Xss-Protection: - 1; mode=block X-Content-Type-Options: - nosniff X-Download-Options: - noopen X-Permitted-Cross-Domain-Policies: - none Content-Security-Policy: - default-src 'self'; child-src 'self' https://rpm.newrelic.com; frame-src 'self' https://rpm.newrelic.com https://www.google.com/recaptcha/; script-src 'self' https://www.google.com/recaptcha/ https://apis.google.com https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/; img-src 'self' https://ssl.gstatic.com/; style-src 'self' 'unsafe-inline'; upgrade-insecure-requests; block-all-mixed-content; report-uri https://firefart.report-uri.io/r/default/csp/enforce; X-Content-Security-Policy: - default-src 'self'; child-src 'self' https://rpm.newrelic.com; frame-src 'self' https://rpm.newrelic.com https://www.google.com/recaptcha/; script-src 'self' https://www.google.com/recaptcha/ https://apis.google.com https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/; img-src 'self' https://ssl.gstatic.com/; style-src 'self' 'unsafe-inline'; upgrade-insecure-requests; block-all-mixed-content; report-uri https://firefart.report-uri.io/r/default/csp/enforce; X-Webkit-Csp: - default-src 'self'; child-src 'self' https://rpm.newrelic.com; frame-src 'self' https://rpm.newrelic.com https://www.google.com/recaptcha/; script-src 'self' https://www.google.com/recaptcha/ https://apis.google.com https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/; img-src 'self' https://ssl.gstatic.com/; style-src 'self' 'unsafe-inline'; upgrade-insecure-requests; block-all-mixed-content; report-uri https://firefart.report-uri.io/r/default/csp/enforce; body: encoding: ASCII-8BIT string: '{"relevanssi":{"latest_version":"3.5.3","last_updated":"2016-04-20T09:39:00.000Z","popular":true,"vulnerabilities":[{"id":6425,"title":"Relevanssi 3.2 - Unspecified SQL Injection","created_at":"2014-08-01T10:58:47.000Z","updated_at":"2015-05-15T13:47:47.000Z","published_date":null,"references":{"url":["http://www.securityfocus.com/bid/65960/"],"secunia":["56641"]},"vuln_type":"SQLI","fixed_in":"3.3"},{"id":6426,"title":"Relevanssi 2.7.2 - Stored XSS Vulnerability","created_at":"2014-08-01T10:58:47.000Z","updated_at":"2015-05-15T13:47:47.000Z","published_date":null,"references":{"secunia":["43461"],"exploitdb":["16233"]},"vuln_type":"XSS","fixed_in":"2.7.3"},{"id":7740,"title":"Relevanssi <= 3.3.7.1 - Cross-Site Scripting (XSS)","created_at":"2015-01-03T11:29:33.000Z","updated_at":"2015-05-15T13:49:13.000Z","published_date":null,"references":{"cve":["2014-9443"],"secunia":["61744"]},"vuln_type":"XSS","fixed_in":"3.3.8"}]}}' http_version: recorded_at: Mon, 23 May 2016 13:00:57 GMT recorded_with: VCR 3.0.3