{"vulnerability": "CVE-2023-3417", "sightings": [{"uuid": "821bdab4-d761-41e4-870a-a1f7c787b80b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34175", "type": "seen", "source": "https://t.me/cibsecurity/69450", "content": "\u203c CVE-2023-34175 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in GrandSlambert Login Configurator plugin &lt;=\u00c2\u00a02.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T18:12:39.000000Z"}, {"uuid": "55002203-d20c-4cfe-a607-4e84dd24c91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34172", "type": "seen", "source": "https://t.me/cibsecurity/69439", "content": "\u203c CVE-2023-34172 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Miled WordPress Social Login plugin &lt;=\u00c2\u00a03.0.4 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T18:12:23.000000Z"}, {"uuid": "fcbacec7-5525-49e8-ab1e-dbe42687c29f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34176", "type": "seen", "source": "https://t.me/cibsecurity/69437", "content": "\u203c CVE-2023-34176 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Chilexpress Chilexpress woo oficial plugin &lt;=\u00c2\u00a01.2.9 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T18:12:21.000000Z"}, {"uuid": "d50bedc1-b4d2-4b35-bdff-f6f442362931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3417", "type": "seen", "source": "https://t.me/cibsecurity/67142", "content": "\u203c CVE-2023-3417 \u203c\n\nThunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird &lt; 115.0.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-24T14:25:56.000000Z"}]}