![](themes/Helius/forums/images/top_left.gif) |
Menu |
![](themes/Helius/forums/images/top_right.gif) |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
![](themes/Helius/forums/images/top_left.gif) |
User Info |
![](themes/Helius/forums/images/top_right.gif) |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 215
Members: 0
Total: 215
|
|
|
|
|
![](themes/Helius/forums/images/top_left.gif) |
Full disclosure |
![](themes/Helius/forums/images/top_right.gif) |
|
|
![](themes/Helius/forums/images/logo1.gif) |
|
![](themes/Helius/forums/images/logo2.gif) |
IT Security and Insecurity Portal |
|
|
|
I've gave the 'exploit' a run, but got the following error:
WordPress 2.1.3 blind sql injection exploit by waraxe Target: http://www.site.com/wordpress/wp-admin/admin-ajax.php sql table pre ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|