<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="bbPress/1.0.1" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Gravity Support Forums Topic: Websecurify</title>
		<link>https://legacy.forums.gravityhelp.com/topic/websecurify-reports-sql-injection-vulnerability</link>
		<description>Gravity Support Forums Topic: Websecurify</description>
		<language>en-US</language>
		<pubDate>Sun, 19 Apr 2026 21:42:00 +0000</pubDate>
		<generator>http://bbpress.org/?v=1.0.1</generator>
		<textInput>
			<title><![CDATA[Search]]></title>
			<description><![CDATA[Search all topics from these forums.]]></description>
			<name>q</name>
			<link>https://legacy.forums.gravityhelp.com/search.php</link>
		</textInput>
		<atom:link href="https://legacy.forums.gravityhelp.com/rss/topic/websecurify-reports-sql-injection-vulnerability" rel="self" type="application/rss+xml" />

		<item>
			<title>Carl Hancock on "Websecurify"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/websecurify-reports-sql-injection-vulnerability#post-4424</link>
			<pubDate>Fri, 02 Apr 2010 10:44:07 +0000</pubDate>
			<dc:creator>Carl Hancock</dc:creator>
			<guid isPermaLink="false">4424@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;I actually ran one of my test sites through Websecurity and it didn't return any SQL injection vulnerabilities.  It did return some vulnerability warnings, however it returned those warnings for ALL forms on my test site... including WordPress related forms (search, comments, etc.) because ALL forms are an &#34;in&#34; for security attacks.  That doesn't mean it's vulnerable, it just means that it is possible because it is a form.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Wheaton College on "Websecurify"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/websecurify-reports-sql-injection-vulnerability#post-4420</link>
			<pubDate>Thu, 01 Apr 2010 20:14:04 +0000</pubDate>
			<dc:creator>Wheaton College</dc:creator>
			<guid isPermaLink="false">4420@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;ok thanks.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Carl Hancock on "Websecurify"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/websecurify-reports-sql-injection-vulnerability#post-4317</link>
			<pubDate>Sun, 28 Mar 2010 18:57:28 +0000</pubDate>
			<dc:creator>Carl Hancock</dc:creator>
			<guid isPermaLink="false">4317@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;We will certainly look into it, although we would need more to go on than just some web security app said there is a vulnerability.  We will try out websecurify and see if it says anything specific.&#60;/p&#62;
&#60;p&#62;We aren't aware of any SQL injection vulnerabilities, and have security checks in place to insure that injection doesn't take place via submitted form data.  &#60;/p&#62;
&#60;p&#62;But we will certainly look into it and see if there is something that needs to be patched.&#60;/p&#62;
&#60;p&#62;I adjusted the title of forum post, until we investigate what Websecurify is reporting there is no need to scare anyone into thinking there is a problem.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Wheaton College on "Websecurify"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/websecurify-reports-sql-injection-vulnerability#post-4314</link>
			<pubDate>Sun, 28 Mar 2010 16:30:34 +0000</pubDate>
			<dc:creator>Wheaton College</dc:creator>
			<guid isPermaLink="false">4314@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Hi, I am not sure if this is a false-positive or not. But, when I run Websecurify against my WP server, it reports that my Gravity Forms are vulnerable to an SQL injection attack.&#60;/p&#62;
&#60;p&#62;&#60;a href=&#34;http://www.websecurify.com/&#34; rel=&#34;nofollow&#34;&#62;http://www.websecurify.com/&#60;/a&#62;&#60;/p&#62;
&#60;p&#62;This could be a problem with Websecurify, or a vulnerability in Gravity Forms. In any event, I thought you should know.
&#60;/p&#62;</description>
		</item>

	</channel>
</rss>
