BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
WordPress Users Ultra Plugin [Blind SQL injection] - Update Dec 08 2015 11:23PM
Panagiotis Vagenas (pan vagenas gmail com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

* Exploit Title: WordPress Users Ultra Plugin [Blind SQL injection]
* Discovery Date: 2015/10/19
* Public Disclosure Date: 2015/12/01
* Exploit Author: Panagiotis Vagenas
* Contact: https://twitter.com/panVagenas
* Vendor Homepage: http://usersultra.co...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus