<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Web Security Archives -</title>
	<atom:link href="https://cvtfradio.net/category/web-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfradio.net/category/web-security/</link>
	<description>Conscious Vibrations from terra firma radio</description>
	<lastBuildDate>Sun, 23 Dec 2018 13:28:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>WordPress 5.0.2 is here</title>
		<link>https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-5-0-2-is-here</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sun, 23 Dec 2018 13:24:48 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://cvtfradio.net/?p=3400</guid>

					<description><![CDATA[<p>&#160; WordPress 5.0.2 is now available! 5.0.2 is a maintenance release that addresses 73 bugs. The primary focus of this release was performance improvements in the block editor: the cumulated performance gains make it 330% faster for a post with 200 blocks. Here are a few of the additional highlights: 45 total Block Editor improvements [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/">WordPress 5.0.2 is here</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png"><img fetchpriority="high" decoding="async" class="aligncenter  wp-image-3403" src="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png" alt="" width="374" height="367" srcset="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png 1000w, https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo-300x294.png 300w, https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo-768x753.png 768w" sizes="(max-width: 374px) 100vw, 374px" /></a></p>
<p>&nbsp;</p>
<p>WordPress 5.0.2 is now available!</p>
<p>5.0.2 is a maintenance release that addresses 73 bugs. The primary focus of this release was performance improvements in the block editor: the cumulated performance gains make it 330% faster for a post with 200 blocks.</p>
<p>Here are a few of the additional highlights:</p>
<ul>
<li>45 total Block Editor improvements are included (14 performance enhancements &amp; 31 bug fixes).</li>
<li><a href="https://core.trac.wordpress.org/query?component=Bundled+Theme&amp;milestone=5.0.2&amp;col=id&amp;col=summary&amp;col=milestone&amp;col=owner&amp;col=type&amp;col=status&amp;col=priority&amp;order=priority">17 Block Editor related bugs</a> have been fixed across all of the bundled themes.</li>
<li>Some <a href="https://core.trac.wordpress.org/query?component=I18N&amp;milestone=5.0.2&amp;col=id&amp;col=summary&amp;col=status&amp;col=owner&amp;col=type&amp;col=priority&amp;col=milestone&amp;order=priority">internationalization (i18n) issues</a> related to script loading have also been fixed.</li>
</ul>
<p>For a full list of changes, please consult the <a href="https://core.trac.wordpress.org/query?status=closed&amp;milestone=5.0.2&amp;group=component">list of tickets on Trac</a> or the <a href="https://core.trac.wordpress.org/log/branches/5.0?action=stop_on_copy&amp;mode=stop_on_copy&amp;rev=44339&amp;stop_rev=44183&amp;limit=100&amp;sfp_email=&amp;sfph_mail=">changelog</a>.</p>
<p>You can <a href="https://wordpress.org/download/">download WordPress 5.0.2</a> or visit Dashboard → Updates and click <em>Update Now</em>. Sites that support automatic background updates have already started to update automatically.</p>
<p>Thank you to everyone who contributed to WordPress 5.0.2:</p>
<p>The post <a href="https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/">WordPress 5.0.2 is here</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebooks Messenger&#8217;s app lets people send their location to friends and it defaults to sending a location with all messages</title>
		<link>https://cvtfradio.net/2015/08/facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Wed, 19 Aug 2015 10:10:53 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[FaceBook Messenger App exploited]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2941</guid>

					<description><![CDATA[<p>&#8216;Marauders Map&#8217; lets you track friends using FB Messenger: Tool plots a precise location each time someone uses the site Harvard student has created a digital &#8216;Marauder&#8217;s Map&#8217; that uses location data from Facebook Messenger to pinpoint an individual&#8217;s movements Relies on people sharing their location by default in messages Map was designed to highlight [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/08/facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages/">Facebooks Messenger&#8217;s app lets people send their location to friends and it defaults to sending a location with all messages</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>&#8216;Marauders Map&#8217; lets you track friends using FB Messenger: Tool plots a precise location each time someone uses the site</h1>
<ul class="mol-bullets-with-font">
<li class=""><strong>Harvard student has created a digital &#8216;Marauder&#8217;s Map&#8217; that uses location data from Facebook Messenger to pinpoint an individual&#8217;s movements</strong></li>
<li class=""><strong>Relies on people sharing their location by default in messages</strong></li>
<li class=""><strong>Map was designed to highlight how much data is leaked from Facebook </strong></li>
</ul>
<p class="author-section byline-plain">By <a class="author" href="https://www.dailymail.co.uk/home/search.html?s=&amp;authornamef=Sarah+Griffiths+for+MailOnline" rel="nofollow">Sarah Griffiths for MailOnline</a></p>
<p class="byline-section"><span class="article-timestamp article-timestamp-published"> <span class="article-timestamp-label">Published:</span> 14:02, 28 May 2015 </span> | <span class="article-timestamp article-timestamp-updated"> <span class="article-timestamp-label">Updated:</span> 16:26, 28 May 2015 </span></p>
<p class="mol-para-with-font">Harry Potter may have had a magical paper ‘Marauder’s Map’ but now there’s a digital equivalent that can pinpoint your friends&#8217; locations using information from Facebook.</p>
<p class="mol-para-with-font">The extension loads when the Messages tab is opened and &#8216;scrapes&#8217; the page for location data to show the movement of friends with a startling degree of accuracy.</p>
<p class="mol-para-with-font">While some people may see the map as a useful tool, it serves to highlight how much data Facebook’s messaging service shares &#8211; and could leave individuals open to stalking, for example.</p>
<div class="artSplitter mol-img-group">
<div class="mol-img"><img decoding="async" id="i-207ecbd3c3ddc516" class="blkBorder img-share aligncenter" src="https://i.dailymail.co.uk/i/pix/2015/05/28/12/29249B1A00000578-0-A_digital_version_of_Harry_Potter_s_Marauder_s_Map_can_pinpoint_-a-30_1432813913356.jpg" alt="Earlier this year, a developer created a browser extension dubbed 'Marauder's Map'. The extension loaded when a person opened their Messages tab and 'scraped' the page for location data to show the movement of friends with a startling degree of accuracy" width="634" height="450" /></div>
<p>The post <a href="https://cvtfradio.net/2015/08/facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages/">Facebooks Messenger&#8217;s app lets people send their location to friends and it defaults to sending a location with all messages</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac OS is not Panacea from Viruses</title>
		<link>https://cvtfradio.net/2015/08/mac-os-is-not-panacea-from-viruses/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mac-os-is-not-panacea-from-viruses</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sat, 08 Aug 2015 20:56:59 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Viruses and Malware]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2924</guid>

					<description><![CDATA[<p>Mac OS is not Panacea from Viruses Added: Friday, August 7th, 2015 &#160; Mac has always been advertised as a platform that is relatively safe from malware. This was due to combination of the lower number of users, less attention from security researchers and, most importantly, fewer security holes in Mac OS than Windows. Apple [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/08/mac-os-is-not-panacea-from-viruses/">Mac OS is not Panacea from Viruses</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<h1>Mac OS is not Panacea from Viruses</h1>
<h6><i class="mini gray">Added: Friday, August 7th, 2015</i></h6>
<p>&nbsp;</p>
<p>Mac has always been advertised as a platform that is relatively safe from malware. This was due to combination of the lower number of users, less attention from security researchers and, most importantly, fewer security holes in Mac OS than Windows. Apple always emphasized its security in the Mac vs PC ad campaign, claiming that Macs don&#8217;t get viruses.</p>
<p><a href="https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2.png"><img decoding="async" class="aligncenter  wp-image-2933" src="https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2.png" alt="3-pictures" width="845" height="162" srcset="https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2.png 1033w, https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2-300x58.png 300w, https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2-1024x196.png 1024w" sizes="(max-width: 845px) 100vw, 845px" /></a></p>
</div>
<div class="article">
<div class="bbcode_center">However, OS X also has some serious vulnerabilities: for example, one of them exploits a weakness that allows a malicious program to gain access to a Mac and run as though it is the administrator of the system. Such a flaw is known as privilege escalation. By running with admin rights, it can bypass many Apples security features that limit the ability of downloaded code from affecting the deeper functions of the OS.</div>
<p>Security experts criticized Apple for having already patched the flaw in the beta versions of its next Mac OS, El Capitan. The problem is that Apple still hasn&#8217;t fixed the flaw in the latest current version of Mac OS, Yosemite. Today this bug has been seen in the wild for the first time: security researchers discovered a new adware installer doing the rounds, which allowed the adware to embed itself into the OS and install itself without requiring the users password.</p>
<p>In the meantime, another exploit will soon be revealed to researchers at the Black Hat security conference. It is known that this exploit uses a bundle of 6 weaknesses in the firmware, which controls the lowest-level functions like fans, power supply units and USB ports. It can allow to overwrite that software with the hackers own code, and 5 of those 6 weaknesses are present on Macs as well as PCs. Since learning about the flaw, Apple has patched two of them, but three still remain unpatched.</p>
<p>Another news is that the security researchers managed to write a proof of concept attack that uses the bug to create a worm, a virus able to spread from Mac to Mac directly. Mac can be infected through a deliberately sent email and then automatically attempt to infect other hardware connected to it. The worm is dubbed Thunderstrike 2 and looks similar to a previous proof-of-concept attack known as BadUSB, which allowed attackers to reprogram USB devices in order to attack hardware. However, even that attack hadn&#8217;t been turned into a worm, thus limiting the potential damage.</p>
<div class="clear"></div>
<p><b>Posted by:</b></p>
<div class="usr"><span title="BOSS">SaM</span></div>
<p><b>Date:</b>  Friday, August 7th, 2015</p>
</div>
<div class="article">
<p>Comments (1) (please <a title="Add Your Comment" href="https://ispunblock.com/surf/uJ1nCfdJ2oLLTHeT6jY5lNmVb-dDnu9GvBIGD76F-Lo">add your comment »</a>)</p>
<div class="borderdark">
<p><a name="comment46429"></a></p>
<table border="0" width="100%" cellspacing="1" cellpadding="0">
<tbody>
<tr>
<td class="tabledata_num" width="1"><b>1</b></td>
<td class="tabledata1" width="100%">
<table border="0" width="100%" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>posted by</p>
<div class="usr"><a href="https://ispunblock.com/surf/uJ1nCfdJ2oLLTHeT6jY5lACwtWthe4zxJHYM9m_yw9orMh8udqoymfspBfqlj1L4">semphys</a></div>
<p>(2015-08-08 16:13:41)</td>
<td align="right"></td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td colspan="2">
<table border="0" width="100%" cellspacing="0" cellpadding="5">
<tbody>
<tr>
<td valign="top"><a title="semphys avatar" href="https://ispunblock.com/surf/uJ1nCfdJ2oLLTHeT6jY5lACwtWthe4zxJHYM9m_yw9orMh8udqoymfspBfqlj1L4"><img decoding="async" title="semphys avatar" src="https://ispunblock.com/surf/drq7Ffw-wwfJia6MxHRhdf-GZi5CGHWPSx_bGMOfa7eEDdLx8YeBxme3RciJtabWqJmcKUBxQZtISXoWvKaoDg" alt="semphys avatar" border="0" /></a></td>
<td class="tabledata0" valign="top">You should be using Linux if afraid of Malware. There isn&#8217;t any, unless you invite it in like a well known friend</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>The post <a href="https://cvtfradio.net/2015/08/mac-os-is-not-panacea-from-viruses/">Mac OS is not Panacea from Viruses</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.4 Security and Maintenance Release</title>
		<link>https://cvtfradio.net/2015/08/wordpress-4-2-4-security-and-maintenance-release/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-4-security-and-maintenance-release</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Tue, 04 Aug 2015 19:21:05 +0000</pubDate>
				<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WP Security and Maintenance Release]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2920</guid>

					<description><![CDATA[<p>WordPress 4.2.4 Security and Maintenance Release  Posted August 4, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><span style="color: #ff6600;"><a style="color: #ff6600;" href="https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a></span></h2>
<div class="meta"><img loading="lazy" decoding="async" class=" aligncenter" src="https://1.bp.blogspot.com/_wICHhTiQmrA/Sfg33R1tfZI/AAAAAAAADko/HM3HTRYJlQg/s1600/help1.PNG" alt="" width="754" height="397" /></div>
<div class="meta"></div>
<div class="meta"></div>
<div class="meta"> Posted August 4, 2015 by <a href="https://profiles.wordpress.org/samuelsidler">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.2.4 is now available. This is a<strong> security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by <a href="https://sucuri.net/">Marc-Alexandre Montpas</a> of Sucuri, <a href="https://helenhousandi.com/">Helen Hou-Sandí</a> of the WordPress security team, <a href="https://www.checkpoint.com/">Netanel Rubin</a> of Check Point, and <a href="https://hackerone.com/reactors08">Ivan Grigorov</a>. It also includes a fix for a potential timing side-channel attack, discovered by <a href="https://www.scrutinizer-ci.com/">Johannes Schmitt</a> of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by <a href="https://www.linkedin.com/in/symbiansymoh">Mohamed A. Baset</a>.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.4 also fixes four bugs. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.4">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=33573&amp;stop_rev=33396">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.4</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.4.</p>
<p><em>Already testing WordPress 4.3? The second release candidate is now available (<a href="https://wordpress.org/wordpress-4.3-RC2.zip">zip</a>) and it contains these fixes. For more on 4.3, see <a href="https://wordpress.org/news/2015/07/wordpress-4-3-release-candidate/">the RC 1 announcement post</a>.</em></p>
<div class="sharedaddy sd-sharing-enabled">
<div class="robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing">
<h3 class="sd-title">Share this:</h3>
</div>
</div>
</div>
<p>The post <a href="https://cvtfradio.net/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adding an Admin User to the WordPress Database via MySQL</title>
		<link>https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adding-an-admin-user-to-the-wordpress-database-via-mysql</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 01 Jun 2015 18:10:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[add user to dababase]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2910</guid>

					<description><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL &#160; &#160; &#160; &#160; &#160; &#160; Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL</p>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://cdn4.wpbeginner.com/blogposts/wpusersinsert.gif" alt="wp-users insert phpmyadmin table" width="520" height="201" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in to the phpMyAdmin and created a new admin user to grant them access. In this article, we will show you a step by step guide on how to create an admin user in WordPress Database via MySQL.</p>
<p>Note: You should always make a backup of your database before performing any MySQL edits. This tutorial requires basic understanding of how phpMyAdmin works.</p>
<p>First, you need to login to phpMyAdmin and locate your WordPress database.</p>
<p>Once inside phpMyAdmin;</p>
<p>Once you are in, we will be making changes to the wp_users and wp_usermeta tables. Lets go ahead and click on wp_users table.</p>
<p>phpMyAdmin wp_users table</p>
<p>We need to insert our new admin user’s information, so click on the Insert tab like it shows in the image above. In the insert form, add the following:</p>
<p>ID – pick a number (in our example, we will use the number 4).<br />
user_login – insert the username you want to use to access the WordPress Dashboard.<br />
user_pass – add a password for this username. Make sure to select MD5 in the functions menu (Refer to the screenshot below).<br />
user_nicename – put a nickname or something else that you would like to refer yourself as.<br />
user_email – add the email you want to associate with this account.<br />
user_url – this would be the url to your website.<br />
user_registered – select the date/time for when this user is registered.<br />
user_status – set this to 0.<br />
display_name – put the name you like to display for this user on the site (it can be your user_nicename value as well).<br />
Click on the Go Button</p>
<p>The post <a href="https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.2 Security and Maintenance Release</title>
		<link>https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-2-security-and-maintenance-release</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Tue, 12 May 2015 22:04:03 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.2 Security and Maintenance Release]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2885</guid>

					<description><![CDATA[<p>WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues: &#160; The Genericons icon font package, which [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><a href="https://wordpress.org/news/2015/05/wordpress-4-2-2/">WordPress 4.2.2 Security and Maintenance Release</a></h2>
<p><a href="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg"><img loading="lazy" decoding="async" class=" size-medium wp-image-2886 alignleft" src="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg" alt="WordPress-logo" width="300" height="159" srcset="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg 300w, https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg 780w" sizes="(max-width: 300px) 100vw, 300px" /></a>Posted May 7, 2015 by <a href="https://samuelsidler.com/">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</p>
<div class="storycontent">
<p>WordPress 4.2.2 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Version 4.2.2 addresses two security issues:</p>
<p>&nbsp;</p>
<ul>
<li>The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on <a href="https://wordpress.org/">WordPress.org</a> (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of <a href="https://netsparker.com">Netsparker</a>.</li>
<li>WordPress versions 4.2 and earlier are affected by a <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/">critical cross-site scripting vulnerability</a>, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi from Baidu[X-team].</li>
</ul>
<p>The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.2">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=32418&amp;stop_rev=32324">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.2</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2.</p>
<p>Thanks to everyone who contributed to 4.2.2:</p>
</div>
<p>The post <a href="https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.1 released new patch</title>
		<link>https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-1-released-new-patch</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 27 Apr 2015 21:48:29 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2364</guid>

					<description><![CDATA[<p>WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability Sarah Gooding April 27, 2015 4 photo credit: Will Montague – cc This morning we reported on an XSS vulnerability in WordPress 4.2, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and released [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<article id="post-42873" class="entry post publish author-sarah post-42873 format-standard has-post-thumbnail category-news category-wordpressorg post_tag-security">
<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Monday, April 27, 2015, 3:46 pm" datetime="2015-04-27T15:46:07-04:00">April 27, 2015</time> <a class="comments-link" href="https://wptavern.com/wordpress-4-2-1-released-to-patch-comment-exploit-vulnerability#comments">4</a></div>
</header>
<div class="entry-content">
<figure id="attachment_20655" class="wp-caption aligncenter"><a class="img-hyperlink" href="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg" rel="prettyPhoto[42873]"><img loading="lazy" decoding="async" class="size-full wp-image-20655" src="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg?resize=1024%2C505" alt="photo credit: Will Montague - cc" width="644" height="318" /></a><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/willmontague/3813295674/">Will Montague</a> – <a href="https://creativecommons.org/licenses/by-nc/2.0/">cc</a></figcaption></figure>
<p>This morning we reported on an <a href="https://wptavern.com/zero-day-xss-vulnerability-in-wordpress-4-2-currently-being-patched" target="_blank">XSS vulnerability in WordPress 4.2</a>, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/" target="_blank">released 4.2.1</a> within hours of being notified.</p>
<p>WordPress’ official statement on the security issue:</p>
<blockquote><p>The WordPress team was made aware of a XSS issue a few hours ago that we will release an update for shortly. It is a core issue, but the number of sites vulnerable is much smaller than you may think because the vast majority of WordPress-powered sites run Akismet, which blocks this attack. When the fix is tested and ready in the coming hours WordPress users will receive an auto-update and should be safe and protected even if they don’t use Akismet.</p></blockquote>
<p>That auto-update is now being rolled out to sites where updates have not been disabled. If you are unsure of whether or not your site can perform automatic background updates, Gary Pendergast linked to the <a href="https://wordpress.org/plugins/background-update-tester/" target="_blank">Background Update Tester</a> plugin in the security release. This is a core-supported plugin that will check your site for background update compatibility and explain any issues.</p>
<p>Since <a href="https://wordpress.org/plugins/akismet/" target="_blank">Akismet</a> is active on more than a million websites, the number of affected users that were not protected is much smaller than it might have been otherwise.</p>
<p>WordPress 4.2.1 is a critical security release for a widely publicized vulnerability that you do not want to ignore. Users are advised to update immediately. The background update may already have hit your site. If not, you can update manually by navigating to Dashboard → Updates.</p>
</div>
</article>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress Security Alert</title>
		<link>https://cvtfradio.net/2015/04/wordpress-security-alert/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-security-alert</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 20:26:39 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Wordpress Security Alert]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2271</guid>

					<description><![CDATA[<p>WordPress Security Alert &#8211; WP Super cache Credit: Wikipedia Upgrade immediately ITWorld&#124;April 8, 2015 Security firm Sucuri revealed on their blog this week that they had uncovered a persistent cross-site scripting vulnerability in the popular WordPress plugin WP Super Cache. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<header>
<h1>WordPress Security Alert &#8211; WP Super cache</h1>
</header>
<figure class="hero-img"><img decoding="async" src="https://images.techhive.com/images/article/2015/04/three_surveillance_cameras-100577821-primary.idge.jpg" alt="three surveillance cameras" /><figcaption> Credit: <a href="https://www.google.com/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=0CAMQjxw&amp;url=ht" target="_blank" rel="nofollow">Wikipedia</a> </figcaption></figure>
<section class="deck">
<h2>Upgrade immediately</h2>
</section>
<div class="byline">
<p class="dateline">ITWorld<span class="divider">|</span>April 8, 2015</p>
</div>
<section class="bodee">
<div id="drr-container">
<p>Security firm <a href="https://sucuri.net/" target="new">Sucuri</a> revealed on their <a href="https://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html" target="new">blog this week</a> that they had uncovered a persistent <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="new">cross-site scripting</a> vulnerability in the popular WordPress plugin<a href="https://wordpress.org/plugins/wp-super-cache/" target="new"> WP Super Cache</a>. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code into WordPress pages without your knowledge. Anyone who has experienced this type of attack due to a plugin security flaw knows how difficult and time consuming remediation can be.</p>
<figure class="large "><img loading="lazy" decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache1-100577816-large.idge.png" alt="supercache1" width="620" height="123" /> <small class="credit">Cypress North</small></figure>
<p>WP Super Cache is deployed across all of the WordPress sites we host in our data center, and for good reason. The excellent plugin dramatically boosts the performance of WordPress sites while simultaneously reducing load on the web servers. The code for this plugin is mature and stable, rarely requiring updates. That&#8217;s part of the reason why it&#8217;s trusted by over 7 million websites. It&#8217;s popularity makes this security flaw a big concern for site owners.</p>
<figure class="medium "><img loading="lazy" decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache2-100577820-medium.idge.png" alt="supercache2" width="375" height="480" /> <small class="credit">Cypress North</small></figure>
<p>The update process is quick and easy so you should take the time to log in and click the update now link as soon as you&#8217;re able. If you&#8217;re fortunate enough to maintain your sites under a multi-site install you&#8217;ll be able to take care of this issue in one shot. Otherwise, like us, you&#8217;re stuck logging into each installation and manually updating each site like we spent all yesterday doing.</p>
<p>According to the blog post by <a href="https://blog.sucuri.net/author/marc" rel="author">Marc-Alexandre Montpas</a>:</p>
<blockquote><p>Using this vulnerability, an attacker using a carefully crafted query could insert malicious scripts to the plugin’s cached file listing page. As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site’s administrator to have a look at that particular section, manually.</p></blockquote>
<p>The nonce requirement lowers the odds of the backdoor taking effect since the cached page gets purged periodically, but still, better safe than sorry. The scale of the vulnerable sites makes exploitation an inevitable event. Do your part to protect the web and get updating.</p>
</div>
</section>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA backdoors in majority of computer hard drives around the world</title>
		<link>https://cvtfradio.net/2015/04/nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 17:19:16 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[NSA backdoors]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2223</guid>

					<description><![CDATA[<p>Shopping for Spy Gear: Catalog Advertises NSA Toolbox By Jacob Appelbaum, Judith Horchert and Christian Stöcker from www.spiegel.de/international taken from &#8211; InSerbia.info DPA Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency. After years of speculation that electronics can be accessed [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world/">NSA backdoors in majority of computer hard drives around the world</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="column-both">
<h2 class="article-title" style="text-align: left;"><span class="headline-intro">Shopping for Spy Gear:</span> <span class="headline">Catalog Advertises NSA Toolbox</span></h2>
<p class="author" style="text-align: justify;">By Jacob Appelbaum, <a class="autor-link js-author-link" href="https://www.spiegel.de/impressum/autor-15954.html" rel="author" data-authorid="15954">Judith Horchert</a> and <a class="autor-link js-author-link" href="https://www.spiegel.de/impressum/autor-1562.html" rel="author" data-authorid="1562">Christian Stöcker</a> from www.spiegel.de/international</p>
<p><a href="https://youtu.be/b0w36GAyZIA">https://youtu.be/b0w36GAyZIA</a></p>
<p>taken from &#8211; <a href="https://inserbia.info/today/2014/01/cisco-dell-western-digital-seagate-maxtor-samsung-apple-with-nsa-backdoors/" target="_blank">InSerbia.info</a></p>
<div id="js-article-top-wide-asset" style="text-align: justify;">
<div class="js-module-box-image box-position  spXXLPano asset-align-center breitwandaufmacher">
<p><a class="image-buttons-panel display-block clearfix" href="https://www.spiegel.de/international/world/bild-940994-584188.html"> <img loading="lazy" decoding="async" class="spPanoImageTeaserPic" title="Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency. " src="https://cdn1.spiegel.de/images/image-584188-breitwandaufmacher-ompq.jpg" alt="Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency. " width="860" height="320" align="middle" /><span class="image-buttons"> <img decoding="async" class="spPicZoom" title="Zoom" src="https://www.spiegel.de/static/sys/v10/icons/ic_lupe.png" alt="Zoom" /> </span> </a></p>
<div class="article-image-description">
<div class="asset-credit">DPA</div>
<p>Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency.</p>
</div>
</div>
</div>
<p class="article-intro" style="text-align: justify;"><strong>After years of speculation that electronics can be accessed by i</strong></p>
</div>
<div id="js-article-column" class="column-wide">
<div class="article-section clearfix">
<p><b class="wp-more-tag mce-wp-nextpage" title="Page break" data-wp-more="nextpage" data-mce-placeholder="1">A 50-Page Catalog</b></p>
<p style="text-align: justify;">These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives &#8212; from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA&#8217;s specialists seem already to have gotten past them.</p>
<p style="text-align: justify;">This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets&#8217; data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.</p>
<div class="asset-box asset-list-box clearfix" style="text-align: justify;">
<ul class="list-ilink clearfix">
<li>
<div class="article-image-box box-position">
<p><a title=" Interactive Graphic:   The NSA's Spy Catalog " href="https://www.spiegel.de/international/world/a-941262.html"><img loading="lazy" decoding="async" title="" src="https://cdn4.spiegel.de/images/image-584477-panoV9free-ngww.jpg" alt="" width="520" height="413" /></a></p>
<div class="asset-credit">SPIEGEL ONLINE</div>
</div>
<p><a title=" Interactive Graphic:   The NSA's Spy Catalog " href="https://www.spiegel.de/international/world/a-941262.html"><span class="asset-headline-intro">Interactive Graphic:</span> <span class="asset-headline">The NSA&#8217;s Spy Catalog</span></a></li>
</ul>
</div>
<p>In the case of Juniper, the name of this particular digital lock pick is &#8220;FEEDTROUGH.&#8221; This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive &#8220;across reboots and software upgrades.&#8221; In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH &#8220;has been deployed on many target platforms.&#8221;</p>
<p style="text-align: justify;"><b>Master Carpenters</b></p>
<p style="text-align: justify;">The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA&#8217;s department for <a class="text-link-int" title="Tailored Access Operations" href="https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html">Tailored Access Operations</a> (TAO). In cases where TAO&#8217;s usual hacking and data-skimming methods don&#8217;t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such &#8220;implants,&#8221; as they are referred to in NSA parlance, have played a considerable role in the intelligence agency&#8217;s ability to establish a global covert network that operates alongside the Internet.</p>
<p style="text-align: justify;">Some of the equipment available is quite inexpensive. A rigged monitor cable that allows &#8220;TAO personnel to see what is displayed on the targeted monitor,&#8221; for example, is available for just $30. But an &#8220;active GSM base station&#8221; &#8212; a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones &#8212; costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.</p>
<p style="text-align: justify;"><b>&#8216;Persistence&#8217;</b></p>
<p style="text-align: justify;">The ANT division doesn&#8217;t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer&#8217;s motherboard that is the first thing to load when a computer is turned on.</p>
<p style="text-align: justify;">This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this &#8220;Persistence&#8221; and believe this approach has provided them with the possibility of permanent access.</p>
<p style="text-align: justify;">Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.</p>
<p>Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are &#8220;remotely installable&#8221; &#8212; in other words, over the Internet. Others require a direct attack on an end-user device &#8212; an &#8220;interdiction,&#8221; as it is known in NSA jargon &#8212; in order to install malware or bugging equipment.</p>
<p style="text-align: justify;">There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. &#8220;Cisco does not work with any government to modify our equipment, nor to implement any so-called security &#8216;back doors&#8217; in our products,&#8221; the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company &#8220;respects and complies with the laws of all countries in which it operates.&#8221;</p>
<p style="text-align: justify;">Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it&#8217;s not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be &#8220;pursued for a future release.&#8221;</p>
</div>
</div>
<p>The post <a href="https://cvtfradio.net/2015/04/nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world/">NSA backdoors in majority of computer hard drives around the world</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Critical Vulnerability in popular WordPress themes</title>
		<link>https://cvtfradio.net/2014/12/critical-vulnerability-popular-wordpress-themes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=critical-vulnerability-popular-wordpress-themes</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sat, 27 Dec 2014 21:37:37 +0000</pubDate>
				<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Critical Vulnerability in WP themes]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2029</guid>

					<description><![CDATA[<p><img width="580" height="388" src="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg 580w, https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery-300x201.jpg 300w" sizes="(max-width: 580px) 100vw, 580px" /></p>
<p>Hackers exploit critical vulnerability in popular WordPress theme component WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said By Lucian Constantin &#124; 04 September 14. Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that&#8217;s used by a large number of themes, researchers from [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2014/12/critical-vulnerability-popular-wordpress-themes/">Critical Vulnerability in popular WordPress themes</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img width="580" height="388" src="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery.jpg 580w, https://cvtfradio.net/wp-content/uploads/2014/12/hacker-hand-hero-size-100015363-gallery-300x201.jpg 300w" sizes="(max-width: 580px) 100vw, 580px" /></p><p>Hackers exploit critical vulnerability in popular WordPress theme component WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said By Lucian Constantin | 04 September 14.</p>
<p>Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that&#8217;s used by a large number of themes, researchers from two security companies warned Wednesday.</p>
<p>The vulnerability affects versions 4.1.4 and older of Slider Revolution, a commercial WordPress plug-in for creating mobile-friendly content display sliders. The flaw was fixed in Slider Revolution 4.2 released in February, but some themes &#8212; collections of files or templates that determine the overall look of a site &#8212; still bundle insecure versions of the plug-in.</p>
<p>The vulnerability can be exploited to execute a local file inclusion (LFI) attack that gives hackers access to a WordPress site&#8217;s wp-config.php file, researchers from Web security firm Sucuri said in a blog post. This sensitive file contains database access credentials that can be used to compromise the whole site, the researchers said.</p>
<p>The post <a href="https://cvtfradio.net/2014/12/critical-vulnerability-popular-wordpress-themes/">Critical Vulnerability in popular WordPress themes</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
