[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fI-_dN-p4O3gw1XxDzjHMeVjg5t-ybMViApzk2OUbiz0":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-34368","mooberry-book-manager-unauthenticated-information-exposure-via-export-files","Mooberry Book Manager \u003C= 4.15.12 - Unauthenticated Information Exposure via Export Files","The Mooberry Book Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.15.12 via exported files. This makes it possible for unauthenticated attackers to extract potentially sensitive information from those files.","mooberry-book-manager",null,"\u003C=4.15.12","4.15.13","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2024-05-03 00:00:00","2024-05-07 13:26:16",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc284ed3e-7f8e-4841-88f3-33e99f98aa83?source=api-prod",5]