News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Community News:
WordPress 2.1.1 Dangerous, Upgrade
March 07, 2007 @ 13:03:00

Just in case you haven't heard yet and are running WordPress version 2.1.1 (that you've downloaded recently), you need to upgrade your installation because of a security exploit that made its way into the software.

From the WordPress Blog:

Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.

If you have even a doubt as to if you're running the bad version, go ahead and upgrade to version 2.1.2. Somehow, an individual gained access to the servers where the package is hosted and altered some of the code in the download file. This resulted in a method to bypass any security in place and allow the attacker full control.

0 comments voice your opinion now!
wordpress attack upgrade security exploit download wordpress attack upgrade security exploit download


blog comments powered by Disqus

Similar Posts

Davey Shafik's Blog: The Blowfish Debacle

Zend Developer Zone: The ZendCon Sessions Episode 1:The State of PHP Security

MelbourneChapter.net: PHP and Authentication Security

Johannes Schlüter: PHP 5.5 is out, what's up with 5.4 and 5.3?

Pádraic Brady's Blog: Sourceforge Ranking Review (Astrum Futura)


Community Events





Don't see your event here?
Let us know!


framework community developer bugfix zendserver symfony list laravel release api interview introduction tips voicesoftheelephpant podcast language library conference series deployment

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework