Yesterday a vulnerability was discovered: a specially crafted URL could be requested that would allow an attacker to bypass a security check to verify a user requested a password reset. As a result, the first account without a key in the database (usually the admin account) would have its password reset and a new password would be emailed to the account owner. This doesn?t allow remote access, but it is very annoying.We fixed this problem last night and have been testing the fixes and looking for other problems since then. Version 2.8.4 which fixes all known problems is now available for download and is highly recommended for all users of WordPress.
Kompuś, kompuś, powiedz przecie, co się dzieje na tym świecie.
Ty szwankujesz, wordpress ktoś hakuje.
Nie pojmuję, nie pojmuję.
Mój własny, osobisty dysk twardy (czytaj mózg) się zawiesił – papaka zamiast mózgu, znowu.
3,637 total views, 6 views today