{"vulnerability": "cve-2023-4067", "sightings": [{"uuid": "eff36cb4-79e7-47e2-be92-87cddb176f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40671", "type": "seen", "source": "https://t.me/cibsecurity/71713", "content": "\u203c CVE-2023-40671 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in ??wp DX-auto-save-images plugin &lt;=\u00c2\u00a01.4.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-06T16:26:41.000000Z"}, {"uuid": "76f4a36c-8125-4eda-b388-31e5d8ef8067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40676", "type": "seen", "source": "https://t.me/cibsecurity/71087", "content": "\u203c CVE-2023-40676 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jason Crouse, VeronaLabs Slimstat Analytics plugin &lt;=\u00c2\u00a05.0.8 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:42:12.000000Z"}, {"uuid": "47dd4cdd-cc77-488e-a762-df36e6188097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4067", "type": "seen", "source": "https://t.me/cibsecurity/67569", "content": "\u203c CVE-2023-4067 \u203c\n\nThe Bus Ticket Booking with Seat Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab_date' and 'tab_date_r' parameters in versions up to, and including, 5.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T12:39:08.000000Z"}, {"uuid": "377aa8d3-c0c3-4371-b06b-6e87cfbb5b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40670", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647345800946773", "content": "", "creation_timestamp": "2024-12-13T20:14:37.478459Z"}, {"uuid": "0b0fb433-d20a-40eb-92fe-168b77d22262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40678", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647345815249506", "content": "", "creation_timestamp": "2024-12-13T20:14:37.688104Z"}]}