[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fXPjYGfg4Iw-wWM-RuRBaJ6sRb9nFHeevOsVcbPBP6Tw":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-24373","booking-calendar-appointment-booking-system-unauthenticated-bypass-vulnerability","Booking calendar, Appointment Booking System \u003C= 3.2.3 - Unauthenticated Bypass Vulnerability","The Booking calendar, Appointment Booking System plugin for WordPress is vulnerable to a bypass in all versions up to, and including, 3.2.3. This makes it possible for unauthenticated attackers to bypass controls. It is unclear from the original source of this vulnerability what the actual impact is.","booking-calendar",null,"\u003C=3.2.3","3.2.4","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","External Control of Assumed-Immutable Web Parameter","2023-01-27 00:00:00","2024-06-18 14:58:11",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff87efb65-b53b-4e9c-b933-9303461487a3?source=api-prod",509]