<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pressed Words &#187; Trojan</title>
	<atom:link href="http://pressedwords.com/tag/trojan/feed/" rel="self" type="application/rss+xml" />
	<link>http://pressedwords.com</link>
	<description>News and commentary about all things WordPress</description>
	<lastBuildDate>Thu, 11 Jun 2009 03:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Beware Upgrading to a Fake WordPress 2.6.4</title>
		<link>http://pressedwords.com/beware-trojan-wordpress/</link>
		<comments>http://pressedwords.com/beware-trojan-wordpress/#comments</comments>
		<pubDate>Fri, 07 Nov 2008 12:49:26 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Snoopy]]></category>
		<category><![CDATA[Trojan]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=121</guid>
		<description><![CDATA[The Register mentions an attack on WordPress blogs that tells users to upgrade to a bogus 2.6.4 version of WordPress. This attack seems to be taking advantage of the security vulnerability that necessitated WordPress 2.6.3, whereby if an attacker could get control of an RSS feed that you publish on your blog (for example using [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.theregister.co.uk/2008/11/06/trojanised_wordpress/"><em>The Register</em> mentions an attack on WordPress blogs</a> that tells users to upgrade to a bogus 2.6.4 version of WordPress.</p>
<p>This attack seems to be taking advantage of the security vulnerability that <a href="http://wordpress.org/development/2008/10/wordpress-263/">necessitated WordPress 2.6.3</a>, whereby if an attacker could get control of an RSS feed that you publish on your blog (for example using the RSS widget), he might be able to execute any commands. </p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/beware-trojan-wordpress/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using memcached
Database Caching 3/5 queries in 0.001 seconds using memcached
Object Caching 235/238 objects using memcached

 Served from: pressedwords.com @ 2026-04-03 16:41:31 by W3 Total Cache -->