BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress Jun 01 2014 06:28AM
Yarubo Internet Security Scan (no-reply yarubo com)
Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress
=========================================================

Program: Participants Database <= 1.5.4.8
Severity: Unauthenticated attacker can fully compromise the Wordpress
installation
Permalink: http://www.yarubo.com/advisorie...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus