Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
WordPress source code compromised to enable remote code execution
Mar 03 2007 08:03AM
ifsecure gmail com
While assessing the security of WordPress, a popular blog creation software, I have discovered that it's source code has recently been compromised by a third party in order to enable remote command execution on the machines running affected versions. The compromised files are wp-includes/feed.php an...
[ more ]
Copyright 2010, SecurityFocus