Snort mailing list archives

MailPoet Vulnerability


From: Júlio César Melo <julio.melo () tempest com br>
Date: Fri, 25 Jul 2014 09:54:20 -0300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

.
http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html

.
http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html

- -
Julio
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=lYts
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Want fast and easy access to all the code in your enterprise? Index and
search up to 200,000 lines of code with a free copy of Black Duck
Code Sight - the same software that powers the world's largest code
search on Ohloh, the Black Duck Open Hub! Try it now.
http://p.sf.net/sfu/bds
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!


Current thread: