Recently vulnerabilities in two are shortage serious plugins of wordpress that are used to frisk content and to improve their yield:
Total W3 Breaks
Super WP Cach

If you use them updates them as rapidly as possible, it is not enough with deactivating them.

You can find more details and connections to the Webs of those plugins to unload the last version in:
http://dediserve.com/blog/w3tc-and-wp-super-cache-vulnerability-discovered-in-wordpress/ (English)
http://www.vozidea.com/vulnerabilidad-en-plugins-de-cache-wordpress (Spanish)

A long time ago also a vulnerability in many subjects of wordpress was discovered:
http://markmaunder.com/2011/zero-day-vulnerability-in-many-wordpress-themes/ (English)
http://www.websitedefender.com/wordpress-security/timthumb-vulnerability-wordpress-plugins-themes/ (English)
http://docs.hostsuar.com/articulo/wordpress-vulnerabilidad-en-timthumb-php (Spanish)

We are useful to remember you it, also reviews that it does not affect to you, looks for if you have in some subject of wordpress some file timthumb.php and if it is inferior to version 1.34 (you can see publishing it the file) updates it.

And if you use others scripts php as Joomla, PHP Nuke, Moodle, forums phpBB or vBulletin, blogs, etc., try to maintain updated them because to almost all with time security problems are discovered to them. And not only script in itself, mant©n updated its modules/plugins/subjects, etc.



Saturday, April 27, 2013

€œBack

Powered by WHMCompleteSolution