<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Уразливість в MODx CMS</title>
	<link>http://websecurity.com.ua/1983/</link>
	<description></description>
	<pubDate>Tue, 21 Apr 2026 11:01:04 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1983/#comment-119649</link>
		<pubDate>Sat, 05 Apr 2008 20:50:50 +0000</pubDate>
		<guid>http://websecurity.com.ua/1983/#comment-119649</guid>
					<description>&lt;strong&gt;Ryan&lt;/strong&gt;

Thanks for fast reply. So this hole is not in core of MODx, but in some third party add-on (in this case add-on for email subscription). I'll inform you about other vulnerabilities which I found at that site which is using MODx CMS.</description>
		<content:encoded><![CDATA[<p><strong>Ryan</strong></p>
<p>Thanks for fast reply. So this hole is not in core of MODx, but in some third party add-on (in this case add-on for email subscription). I&#8217;ll inform you about other vulnerabilities which I found at that site which is using MODx CMS.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Ryan Thrash</title>
		<link>http://websecurity.com.ua/1983/#comment-119358</link>
		<pubDate>Thu, 03 Apr 2008 21:22:43 +0000</pubDate>
		<guid>http://websecurity.com.ua/1983/#comment-119358</guid>
					<description>This appears to be a site-specific exploit due to third party add-on email or newsletter code running on an older version of MODx. We cannot reproduce this with current MODx distributions.</description>
		<content:encoded><![CDATA[<p>This appears to be a site-specific exploit due to third party add-on email or newsletter code running on an older version of MODx. We cannot reproduce this with current MODx distributions.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
