info
discussion
exploit
solution
references
Mahara Username Generation SQL Injection Vulnerability
Attackers can use readily available network utilities to exploit this issue.
Privacy Statement
Copyright 2010, SecurityFocus