{"vulnerability": "cve-2023-4337", "sightings": [{"uuid": "643d63a9-89bf-4824-986e-e5d93531f21c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43378", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13062", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43378\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the commento1_1 parameter.\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T14:47:32.234Z\n\ud83d\udd17 References:\n1. https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-hoteldruid-version-3-0-5-via-commento1_1-post-parameter-44ff18cb61cd4a80bbba75d5e4360ee4", "creation_timestamp": "2025-04-23T15:04:57.000000Z"}, {"uuid": "8e5d1f8e-d88f-4bdf-8036-2f5ba656e94b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43373", "type": "seen", "source": "https://t.me/cibsecurity/70829", "content": "\u203c CVE-2023-43373 \u203c\n\nHoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T22:29:37.000000Z"}, {"uuid": "519113ff-7d7d-4bf9-97de-c1c38a5e72ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43374", "type": "seen", "source": "https://t.me/cibsecurity/70837", "content": "\u203c CVE-2023-43374 \u203c\n\nHoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T22:29:45.000000Z"}, {"uuid": "56fa5954-cb2c-42bf-a67b-257aef37a4ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43376", "type": "seen", "source": "https://t.me/cibsecurity/70830", "content": "\u203c CVE-2023-43376 \u203c\n\nA cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the nometipotariffa1 parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T22:29:38.000000Z"}, {"uuid": "8435a045-27c3-4686-af4e-90024e2ea14f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43371", "type": "seen", "source": "https://t.me/cibsecurity/70828", "content": "\u203c CVE-2023-43371 \u203c\n\nHoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the numcaselle parameter at /hoteldruid/creaprezzi.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T22:29:36.000000Z"}, {"uuid": "fe030a06-c132-46d8-aaae-3ca9c276996d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43377", "type": "seen", "source": "https://t.me/cibsecurity/70827", "content": "\u203c CVE-2023-43377 \u203c\n\nA cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-21T04:32:39.000000Z"}]}