source: http://www.securityfocus.com/bid/56660/info The Webplayer plugin is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. http://www.example.com/wp-content/plugins/webplayer/config.php?id=[SQL]
Related Exploits
Trying to match OSVDBs (1): 87832Other Possible E-DB Search Terms: WordPress Plugin Webplayer
Date | D | V | Title | Author | No matches |
---|