[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6Z8RbxXgWrniBnKQ2jZXMXJmlHby1EPeEWtM1ZBc4rg":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2018-10363","booking-calendar-appointment-booking-system-unauthenticated-parameter-manipulation","Booking calendar, Appointment Booking System \u003C 2.2.3 - Unauthenticated Parameter Manipulation","An issue was discovered in the WpDevArt \"Booking calendar, Appointment Booking System\" plugin in versions up to, and including, 2.2.2 for WordPress. Multiple parameters allow remote attackers to manipulate the values to change data such as prices.","booking-calendar",null,"\u003C=2.2.2","2.2.3","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:N","Improper Input Validation","2018-06-07 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa94708ec-ab09-4604-80ec-5bd85799c6e4?source=api-prod",2056]