![]() |
Exploit for Easy Forms - Credible?
While doing some testing with Easy Forms, I came across a few sites making reference to a private SQL injection exploit that was made available in 2014.
I haven't seen any mention of this in the mod discussion forums or elsewhere. Anyone know if it is legit? |
Google search:
https://www.google.com/webhp?sourcei...+Forms+exploit |
Quote:
Has this been confirmed or addressed? |
Quote:
|
Quote:
|
All times are GMT. The time now is 01:01 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|