[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f_7dwZM71Fnms0fO-fzfiVNSkd9LLLKvh4n3xRYWAag0":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-24867","wp-visitor-statistics-real-time-traffic-sensitive-information-exposure-via-log-file","WP Visitor Statistics (Real Time Traffic) \u003C= 6.9.4 - Sensitive Information Exposure via Log File","The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.9.4. This makes it possible for unauthenticated attackers to extract sensitive data from log files.","wp-stats-manager",null,"\u003C=6.9.4","6.9.5","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2024-02-02 00:00:00","2024-02-05 18:14:45",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff2d69d59-390d-4f3c-96ba-487707cac7a6?source=api-prod",4]