{"id":4182,"date":"2024-07-01T19:45:19","date_gmt":"2024-07-01T19:45:19","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-no-autenticada-en-email-subscribers-by-icegram-express-para-wordpress\/"},"modified":"2024-07-01T19:45:19","modified_gmt":"2024-07-01T19:45:19","slug":"vulnerabilidad-de-inyeccion-sql-no-autenticada-en-email-subscribers-by-icegram-express-para-wordpress","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-no-autenticada-en-email-subscribers-by-icegram-express-para-wordpress\/","title":{"rendered":"Vulnerabilidad de Inyecci\u00f3n SQL no autenticada en Email Subscribers by Icegram Express para WordPress"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad de Inyecci\u00f3n SQL en el plugin Email Subscribers by Icegram Express para WordPress permite a atacantes no autenticados ejecutar consultas SQL adicionales y extraer informaci\u00f3n sensible de la base de datos. La vulnerabilidad CVE-2024-6172 se debe a la falta de escapado adecuado en el par\u00e1metro db y a la falta de preparaci\u00f3n suficiente […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1892],"class_list":["post-4182","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6172"],"yoast_head":"\n