![]() |
update wordpress, phpadsnew, postnuke - remote code execution
Theres a php xml vulnerability that allows remote code execution.
The vulnerability is found in php's xml-rpc implementation and in many php software packages that implement their own xml-rpc library. I think many of you use wordpress, phpadsnew, postnuke and should start upgrading asap or urge your host to do so. I've tested it on several installations and the bug is very serious don't ignore this. http://news.netcraft.com/archives/20...xploits.ht ml http://www.securityfocus.com/bid/14088/info Today is gonna be a long day... get to work |
Thanks for the tip Man.
|
:thumbsup
|
while your at it, make sure your phpBB'es are up2date as well.
Theres a remote code execution vulnerability in versions prior to 2.0.16 Theres enough stuff for a new worm. |
keep this fucker up.
|
thanks i have to update my nuke site
|
Bumpity bump. Thanks for the heads up on this!!!
I'm all patched up now. :thumbsup |
Thanks for letting us know, hard to keep with so much stuff nowadays.
Cheers |
All times are GMT -7. The time now is 07:11 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123