<?xml version='1.0' encoding='UTF-8'?>
<rss version='2.0'>
	<channel>
		<title>cotonti.com : maybe you should check this</title>
		<link>https://www.cotonti.com</link>
		<description>Last topic posts</description>
		<generator>Cotonti</generator>
		<language>en</language>
		<pubDate>Sat, 11 Apr 2026 17:47:25 -0000</pubDate>

		<item>
			<title>urlkiller</title>
			<description><![CDATA[<p>
	i can confirm that problem on my servers too...<br />
	most of my clients had that, in 80% of the cases wordpress systems where affected (PHP 5.3.8)</p>
]]></description>
			<pubDate>Fri, 30 Dec 2011 08:19:03 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/forums?m=posts&q=6692&d=0#post32350]]></link>
		</item>
		<item>
			<title>Trustmaster</title>
			<description><![CDATA[<p>
	I've seen the report before but unfortunately there are no details about vulnerable PHP versions, neither about mitigation. However, I couldn't confirm this on my servers, so definitely not all servers are affected.</p>
]]></description>
			<pubDate>Mon, 26 Dec 2011 07:24:41 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/forums?m=posts&q=6692&d=0#post32276]]></link>
		</item>
		<item>
			<title>diablo</title>
			<description><![CDATA[<p>
	im no server expert and the text was TLDR;<br />
	http://www.pcworld.com/businesscenter/article/246948/hackers_abuse_php_setting_to_inject_malicious_code_into_websites.html</p>
]]></description>
			<pubDate>Mon, 26 Dec 2011 01:30:20 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/forums?m=posts&q=6692&d=0#post32270]]></link>
		</item>
	</channel>
</rss>