The ward is a factory for the Combine
Monthly Archives: May 2006
this issue has been completely (I hope) fixed. at least as you can see it’s all right with this theme.
thank you guys for care and support!
as you can see this post is filed under ‘Wordpress.com’ category, but where is this category link on my sidebar?
1) create two nested categories like this:
2) create a post and file it under ‘Child’ category
instead of expected link to the ‘Child’ category, you can see NOTHING on the Sidebar under ‘Categories’ section.
and yes, since my categories has an hierarchical structure, Category widget has a ’Show Heirarchy’ option turned on. I hope it does not implies any ’security over features matter’ and allowed not only on the paid hosted wp install.
I also mentioned this bug in the “non-empty subcategories are NOT displayed on the sidebar” forum thread (a week ago; no reply to feedback yet), before that I’ve asked in this thread (more than month ago; no reply yet), also this issue was filed as a feedback on 04/19 (and I got one reply from Andy).
after I had to study http://trac.wordpress.org I found that Ryan made changes into relevant functions, not sure if they fix this bug or ported into MU core.
Secunia Advisory: SA20153 Release Date: 2006-05-19 Critical: Extremely critical Impact: System access Where: From remote Solution Status: Unpatched Software: Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office XP
Microsoft Word 2002
Microsoft Word 2003
A vulnerability has been reported in Microsoft Word, which can be exploited by malicious people to compromise a user’s system.
The vulnerability is caused due to an unspecified error. This can be exploited to execute arbitrary code.
NOTE: This vulnerability is being actively exploited.
The vulnerability has been reported in Microsoft Word 2002 and Microsoft Word 2003.
“We are still analyzing the trojan dropped by the exploit. What we do know is that it communicates back to localhosts[dot]3322[dot]org via HTTP. It is proxy-aware, and “pings” this server using HTTP POSTs of 0 bytes (no data actually POSTed) with a periodicity of approximately one minute. It has rootkit-like functionality, hiding binary files associated with the exploit (all files on the system named winguis.dll will not be shown in Explorer, etc.), and invokes itself automatically by including the trojan binary in
Note that, as of this morning, no anti-virus signatures detected this file as problematic according to virustotal.com