{"id":4112,"date":"2024-06-20T16:45:11","date_gmt":"2024-06-20T16:45:11","guid":{"rendered":"http:\/\/127.0.0.1\/icegram-express-vulnerabilidad-de-inyeccion-sql-no-autenticada-a-traves-de-la-configuracion-de-optin\/"},"modified":"2024-06-20T16:45:11","modified_gmt":"2024-06-20T16:45:11","slug":"icegram-express-vulnerabilidad-de-inyeccion-sql-no-autenticada-a-traves-de-la-configuracion-de-optin","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/icegram-express-vulnerabilidad-de-inyeccion-sql-no-autenticada-a-traves-de-la-configuracion-de-optin\/","title":{"rendered":"Icegram Express – Vulnerabilidad de Inyecci\u00f3n SQL no autenticada a trav\u00e9s de la configuraci\u00f3n de optin"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad CVE-2024-5756 afecta al plugin de WordPress Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce en su versi\u00f3n 5.7.23 y anteriores, permitiendo a atacantes no autenticados llevar a cabo una inyecci\u00f3n SQL basada en el tiempo a trav\u00e9s del par\u00e1metro db. La falta de un escape adecuado en […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1822],"class_list":["post-4112","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-5756"],"yoast_head":"\n