{"id":4178,"date":"2024-07-01T16:45:20","date_gmt":"2024-07-01T16:45:20","guid":{"rendered":"http:\/\/127.0.0.1\/payplus-payment-gateway-6-6-8-inyeccion-sql-sin-autenticacion\/"},"modified":"2024-07-01T16:45:20","modified_gmt":"2024-07-01T16:45:20","slug":"payplus-payment-gateway-6-6-8-inyeccion-sql-sin-autenticacion","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/payplus-payment-gateway-6-6-8-inyeccion-sql-sin-autenticacion\/","title":{"rendered":"PayPlus Payment Gateway <= 6.6.8 – Inyecci\u00f3n SQL sin autenticaci\u00f3n"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad de Inyecci\u00f3n SQL sin autenticaci\u00f3n en el plugin PayPlus Payment Gateway para WordPress en todas las versiones hasta, e incluyendo, la 6.6.8 permite a atacantes no autenticados agregar consultas SQL adicionales a consultas existentes que pueden ser utilizadas para extraer informaci\u00f3n sensible de la base de datos. La falta de escape adecuado en […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1888],"class_list":["post-4178","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6205"],"yoast_head":"\n