[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fTBi6UsJbk2M2MEnmERCcgckZi46z6aC-fu5nxZV4vvs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-38747","hitpay-payment-gateway-for-woocommerce-information-exposure-via-log-files","HitPay Payment Gateway for WooCommerce \u003C= 4.1.3 - Information Exposure via Log Files","The HitPay Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.1.3 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.","hitpay-payment-gateway",null,"\u003C=4.1.3","4.1.4","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information into Log File","2024-07-11 00:00:00","2024-07-19 13:54:56",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5db4709d-0121-4b37-b0d2-79aa7943b442?source=api-prod",9]