{"id":3259,"date":"2024-03-20T14:45:22","date_gmt":"2024-03-20T14:45:22","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-de-sql-en-el-plugin-de-reservas-de-citas-simply-schedule-appointments-booking-1-6-7-7-autenticado-subscriber\/"},"modified":"2024-03-20T14:45:22","modified_gmt":"2024-03-20T14:45:22","slug":"vulnerabilidad-de-inyeccion-de-sql-en-el-plugin-de-reservas-de-citas-simply-schedule-appointments-booking-1-6-7-7-autenticado-subscriber","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-de-sql-en-el-plugin-de-reservas-de-citas-simply-schedule-appointments-booking-1-6-7-7-autenticado-subscriber\/","title":{"rendered":"Vulnerabilidad de Inyecci\u00f3n de SQL en el Plugin de Reservas de Citas Simply Schedule Appointments Booking <= 1.6.7.7 – Autenticado (Subscriber+)"},"content":{"rendered":"
<\/p>\n
El plugin Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking para WordPress es vulnerable a Inyecci\u00f3n de SQL a trav\u00e9s del par\u00e1metro keys en todas las versiones hasta, e incluyendo, 1.6.7.7 debido a la falta de escape suficiente en el par\u00e1metro proporcionado por el usuario y la falta de preparaci\u00f3n suficiente en la consulta SQL […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[971],"class_list":["post-3259","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-2341"],"yoast_head":"\n