[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fBXQXIRMyU7shjKZUNTN9h33g_3few_jbxH951t3tFg4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2018-1002000","arigato-autoresponder-and-newsletter-sql-injection","Arigato Autoresponder and Newsletter \u003C= 2.5.1.8 - SQL Injection","There is blind SQL injection in WordPress Arigato Autoresponder and Newsletter v2.5.1.8 These vulnerabilities require administrative privileges to exploit. There is an exploitable blind SQL injection vulnerability via the del_ids variable by POST request.","bft-autoresponder",null,"\u003C=2.5.1.8","2.5.1.9","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2018-09-18 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fb4939efc-889a-4d1d-b916-dcf3b064dc81?source=api-prod",1953]