[wp-hackers] xml-rpc threat ?
podz at tamba2.org.uk
Mon Nov 7 15:06:17 GMT 2005
"xml-rpc for php is used in a large number of popular web applications
such as PostNuke, Drupal, b2evolution, Xoops, WordPress, PHPGroupWare
and TikiWiki. When exploited, this could compromise a vulnerable system.
Most of these packages should have xml-rpc for php vulnerability fixed
in the latest version. If you are still running an old version, you
should get it updated immediately."
I'm assuming it's fixed, but confirmation ahead of any forum posts would
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 250 bytes
Desc: OpenPGP digital signature
Url : http://comox.textdrive.com/pipermail/wp-hackers/attachments/20051107/08ed127c/signature.pgp
More information about the wp-hackers