Dear %PERS_NAME%
Trouble reading this message? Read it online.
Your Security Updates
Below are all the vulnerabilities that have been discovered recently, please do update or patch your application.

 WordPress Arbitrary File Upload
/2011/05/wordpress-arbitrary-file-upload.html

 WordPress WP-DBManager Plugin Two Vulnerabilities
/2011/05/wordpress-wp-dbmanager-plugin-two-vulnerabilities.html

 Joomla! DOCman Component SQL Injection
/2011/05/joomla-docman-component-sql-injection.html

  PHPCalendar Cross-Site Scripting and Script Insertion
/2011/05/phpcalendar-cross-site-scripting-and-script-insertion.html

 WordPress is_human() Plugin "type" Code Injection
/2011/05/wordpress-is_human-plugin-type-code-injection.html

 Drupal Webform Module Script Insertion
/2011/05/drupal-webform-module-script-insertion.html

 Joomla! jDownloads Component Arbitrary File Upload
/2011/05/joomla-jdownloads-component-arbitrary-file-upload.html

 Tugux CMS Cross-Site Scripting and SQL Injection
/2011/05/tugux-cms-cross-site-scripting-and-sql-injection.html

 Joomla! Map Locator "cid" SQL Injection
/2011/05/joomla-map-locator-cid-sql-injection.html

 Joomla! JE Story submit Component Unspecified File Inclusion
/2011/05/joomla-je-story-submit-component-unspecified-file-inclusion.html

Web Hosting
" Was this information helpful? "    yes-button     no button
We highly appreciate your feedback on our security portal.Please send us your feedback to feedback@exabytes.com
Exabytes Security Newsletter was sent to Exabytes.com active clients with valid newsletter subscription only.
To change your newsletter subscription option, please log into Exabytes Online Billing Center.
This newsletter was composed and sent using Exabytes EBuzzzz - Hosted Email Marketing Application