<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Portfolio Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/portfolio/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/portfolio/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Wed, 30 Jun 2021 11:37:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>How to find and replace text with one click in your WordPress database</title>
		<link>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/</link>
					<comments>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 24 Apr 2016 12:01:29 +0000</pubDate>
				<category><![CDATA[Design]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[find and replace WP text]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3413</guid>

					<description><![CDATA[<p>    Last updated on April 21st, 2016 by Editorial Staff Share This Article Are you looking to do a mass search and replace in WordPress? Whether you want to find and replace a specific text, URL, or an image, you can easily do so by using a find and replace WordPress plugin or a  [...]</p>
<p>The post <a href="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/">How to find and replace text with one click in your WordPress database</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="horizontalsocial" dir="LTR"> <img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-3414" src="https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress.png" alt="find-and-replace-text-in-wordpress" width="589" height="491" srcset="https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress-300x250.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress-500x417.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress.png 589w" sizes="(max-width: 589px) 100vw, 589px" /></div>
<p>&nbsp;</p>
<h6>Last updated on April 21st, 2016 by <a href="https://www.wpbeginner.com/author/wpbeginner/">Editorial Staff</a></h6>
<div id="horizontalsocial" dir="LTR">
<p>Share This Article</p>
</div>
<p>Are you looking to do a mass search and replace in WordPress? Whether you want to find and replace a specific text, URL, or an image, you can easily do so by using a find and replace WordPress plugin or a simple SQL query. In this article, we will show you how to find and replace text in your WordPress database.</p>
<h4 class="western">When You May Need Find &amp; Replace for WordPress Database?</h4>
<p>Let’s suppose that you have added specific text or URL to a number of your posts. You don’t know which posts you have added that text to, but you do know that there are a lot of them.</p>
<p>Now you can manually search your site and edit every single post one by one. That’s going to take time and has a high chance of you missing some occurrences.</p>
<p>Using a single command to automatically find and replace will do the same thing but much quicker and efficiently.</p>
<p>There is one downside to it though. If you made a mistake, then you will not be able to undo it. Once you replace the text, it is gone. You will need to carefully type the text you are looking for and the text you want to replace it with.</p>
<p>Having said that, let’s see how you can easily find and replace text in your WordPress database.</p>
<h4 class="western">Getting Started</h4>
<p>As we mentioned earlier that the changes you make to your database will not be reversible. You need to take every precaution to make sure that you don’t lose data.</p>
<p>First you need to create a WordPress database backup. You can do that by using a <a href="https://www.wpbeginner.com/plugins/7-best-wordpress-backup-plugins-compared-pros-and-cons/">WordPress backup plugin</a>. Alternatively, you can also create a <a href="https://www.wpbeginner.com/beginners-guide/how-to-make-a-wordpress-database-backup-manually/">database backup using phpMyAdmin</a>.</p>
<p>After creating the backup of your WordPress database, you can move on to run your find and replace commands.</p>
<h4 class="western">Running Find and Replace with a WordPress plugin</h4>
<p>If you are not familiar with code and don’t want to write a custom SQL query, then there is an easy to use find and replace WordPress plugin called <a href="https://wordpress.org/plugins/better-search-replace/" target="_blank" rel="noopener">Better Search Replace</a>.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn2.wpbeginner.com/wp-content/uploads/2009/10/search-replace-db.png" alt="Better search replace plugin settings" width="520" height="466" name="graphics5" align="BOTTOM" border="0" /></p>
<p>It allows you to run search and replace commands from inside your WordPress admin area. We have a detailed guide on <a href="https://www.wpbeginner.com/plugins/search-and-replace-plugin-for-wordpress-database/">how to search and replace in WordPress with Better Search Replace plugin</a>.</p>
<h4 class="western">Running Find &amp; Replace MySQL Query with phpMyAdmin</h4>
<p>You can also use phpMyAdmin to find and replace text from your WordPress database.</p>
<p>First you need to login to cPanel dashboard of your <a href="https://www.wpbeginner.com/wordpress-hosting/">WordPress hosting</a>. Scroll down to the database section and then click on phpMyAdmin.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn3.wpbeginner.com/wp-content/uploads/2016/04/phpmyadmin.png" alt="phpMyAdmin" width="520" height="177" name="graphics6" align="BOTTOM" border="0" /></p>
<p>The screenshot above is showing the cPanel dashboard on <a href="https://www.wpbeginner.com/refer/bluehost/" target="_blank" rel="noopener">BlueHost</a>. Your cPanel dashboard may look slightly different.</p>
<p>This will launch phpMyAdmin where you will need to click on your WordPress database name and then click on SQL.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn.wpbeginner.com/wp-content/uploads/2016/04/phpmyadminsql.png" alt="Running SQL query in phpMyAdmin" width="520" height="259" name="graphics7" align="BOTTOM" border="0" /></p>
<p>You will need to enter your SQL query in this format:</p>
<p><code class="western">update</code> <code class="western">TABLE_NAME set</code> <code class="western">FIELD_NAME </code></p>
<p><code class="western">replace(FIELD_NAME, 'Text to find', 'text to replace with'); </code></p>
<p>For example, if you wanted to search for text in a WordPress post’s content, then you would write your query like this:</p>
<p><code class="western">update</code> <code class="western">wp_posts set</code> <code class="western">post_content</code></p>
<p><code class="western">replace(post_content,'Text to find','text to replace with');</code></p>
<p>Click on the ‘Go’ button to continue.</p>
<p>PhpMyAdmin will run your SQL query and upon success it will show the number of rows affected by the query.</p>
<p>You can now visit your WordPress site to see your changes in action.</p>
<p>We hope this article helped you learn how to find and replace text with one click in your WordPress database. You may also want to see our beginner’s guide on <a href="https://www.wpbeginner.com/beginners-guide/beginners-guide-to-wordpress-database-management-with-phpmyadmin/">WordPress database management with phpMyAdmin</a>.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&#038;title=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" data-a2a-url="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/" data-a2a-title="How to find and replace text with one click in your WordPress database"></a></p><p>The post <a href="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/">How to find and replace text with one click in your WordPress database</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet SSH Backdoor Found In Firewalls</title>
		<link>https://cvtfstudios.net/3399-2/</link>
					<comments>https://cvtfstudios.net/3399-2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Apr 2016 12:35:29 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Fortinet SSH Backdoor Found In Firewalls]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3399</guid>

					<description><![CDATA[<p>    January 14, 2016 So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally. Which is scary. They are adamantly shouting from rooftops that it was not planted by a 3rd party (NSA? Like  [...]</p>
<p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="post-meta"><abbr class="date time published updated" title="2016-01-14T01:55:11+0800"> </abbr></div>
<section class="entry">
<p align="center"><img decoding="async" class="aligncenter" src="https://c2.staticflickr.com/2/1720/24332701546_d394b9b905.jpg" alt="Fortinet SSH Backdoor Found In Firewalls" /></p>
<p>&nbsp;</p>
<p><abbr class="date time published updated" title="2016-01-14T01:55:11+0800">January 14, 2016</abbr></p>
<p>So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally.</p>
<p>Which is scary.</p>
<p>They are adamantly shouting from rooftops that it was not planted by a 3rd party (<a href="https://www.schneier.com/blog/archives/2015/12/back_door_in_ju.html">NSA? Like Juniper</a>..) or any kind of malicious activity.</p>
<blockquote><p>Enterprise security vendor Fortinet has attempted to explain why its FortiOS firewalls were shipped with hardcoded SSH logins.</p>
<p>It appears Fortinet’s engineers implemented their own method of authentication for logging-into FortiOS-powered devices, and the mechanism ultimately uses a secret passphrase. This code was reverse-engineered by persons unknown, and a Python script to exploit the hole emerged on the Full Disclosure mailing list this week.</p>
<p>Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system.</p>
<p>“This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to ensuring the quality and integrity of our codebase,” a spokeswoman told El Reg.</p>
<p>“This was not a ‘backdoor’ vulnerability issue but rather a management authentication issue. The issue was identified by our product security team as part of their regular review and testing efforts. After careful analysis and investigation, we were able to verify this issue was not due to any malicious activity by any party, internal or external.”</p>
<p>In a security advisory dated today, Fortinet explained that the issue affects FortiOS versions 4.3.0 to 4.3.16 and 5.0.0 to 5.0.7. This covers FortiOS builds from between November 2012 and July 2014, and it’s certainly possible that some slack IT admins haven’t updated the software since then.</p></blockquote>
<div align="center"></div>
<p>It was actually patched by Fortinet in July 2014, but with edge devices like Firewalls – they don’t often get updated as it usually causes network downtime. So I’d guess there are plenty of firewalls out there very vulnerable to this, which basically gives you full admin access.</p>
<p>You can find the ‘exploit’ script in Python here: <a href="https://seclists.org/fulldisclosure/2016/Jan/26">SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7</a></p>
<blockquote><p>It’s also possible that even if they did update in a timely fashion, their devices could have been breached before the fix was issued.</p>
<p>The login method is used by FortiManager, a tool for controlling any number of Fortinet devices from a central system.</p>
<p>If you are running older code and can’t upgrade, the firewall maker suggests a couple of workarounds. Managers can disable admin access via SSH and use the web interface instead, or the console browser applet for command-line access. If you really need SSH access, then version 5.x can restrict access to SSH to a minimal set of authorized IP addresses.</p>
<p>Whether you call it a backdoor or a “management authentication issue,” it’s still a pretty major issue for some sysadmins, and they are unlikely to be happy about the news.</p>
<p>One significant part of Fortinet’s statement was the assertion that this didn’t come from an external party. Ever since the Juniper backdooring security vendors have been at pains to avoid any suggestion that they are allowing intelligence agencies access to their products.</p>
<p>In the meantime, if you are using FortiOS then make sure the fimrware is up to date. The news of this hole will have the malicious hacking community aflutter and many are no doubt already scanning for vulnerable targets.</p></blockquote>
<p>There are some work arounds, what I’d personally like to see though is more transparency about the process and decisions made that led to this code being on production firewalls. How does this even happen?</p>
<p>And how did they only find it during scheduled review and testing? What kind of testing/QA/CI process do they have?</p>
<p>It all sounds rather fishy to me.</p>
<p>Source: <a href="https://www.theregister.co.uk/2016/01/12/fortinet_bakdoor/">The Register</a></p>
</section>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&#038;title=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" data-a2a-url="https://cvtfstudios.net/3399-2/" data-a2a-title="Fortinet SSH Backdoor Found In Firewalls"></a></p><p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/3399-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use SSH Pipes on Linux</title>
		<link>https://cvtfstudios.net/use-ssh-pipes-linux/</link>
					<comments>https://cvtfstudios.net/use-ssh-pipes-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Mar 2016 13:35:02 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[SSH Pipes on Linux]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3319</guid>

					<description><![CDATA[<p>Like most commands on Linux, SSH can be used with input/output redirection via |Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works. When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix  [...]</p>
<p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-large wp-image-70749" src="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png" alt="" width="1024" height="830" srcset="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-177x142.png 177w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-200x162.png 200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-300x243.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-400x324.png 400w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-500x406.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-600x487.png 600w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-700x568.png 700w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-800x649.png 800w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png 1024w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1200x973.png 1200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy.png 1344w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Like most commands on Linux, SSH can be used with input/output redirection via <code>|</code>Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works.<br />
When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix pipes and SSH. It should be noted that since Unix pipes can be just about anything, there are no doubt going to be commands not on this list would also be useful.</p>
<h2 class="nolinks">Understanding the Unix Pipeline</h2>
<p>Pipes on Unix (and by extension, Linux) are used to chain programs together and make them work together. For example, using <code>cat</code>, you can show the contents of a file, but if you used a pipe, you could chain the <code>cat</code> command to the <code>more</code> command to make the file easier to read through.</p>
<div class="holsh-div">
<div class="bash">
<pre>cat file1 | more</pre>
</div>
</div>
<p>&nbsp;</p>
<p>The basic idea here is this: <code>program1 fileX | program2</code>. It’s not just limited to one file and two programs, though. Piping can get about as advanced as you need it to be with as many modifiers as you can think of.</p>
<p><strong>Note:</strong> Some types of pipes can be done without using the <code>|</code>. Some may use <code>&gt;</code> instead.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&#038;title=How%20to%20Use%20SSH%20Pipes%20on%20Linux" data-a2a-url="https://cvtfstudios.net/use-ssh-pipes-linux/" data-a2a-title="How to Use SSH Pipes on Linux"></a></p><p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/use-ssh-pipes-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.4 Security and Maintenance Release</title>
		<link>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 04 Aug 2015 19:21:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WP Security and Maintenance Release]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2920</guid>

					<description><![CDATA[<p>WordPress 4.2.4 Security and Maintenance Release  Posted August 4, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><span style="color: #ff6600;"><a style="color: #ff6600;" href="https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a></span></h2>
<div class="meta"><img decoding="async" class=" aligncenter" src="https://1.bp.blogspot.com/_wICHhTiQmrA/Sfg33R1tfZI/AAAAAAAADko/HM3HTRYJlQg/s1600/help1.PNG" alt="" width="754" height="397" /></div>
<div class="meta"></div>
<div class="meta"></div>
<div class="meta"> Posted August 4, 2015 by <a href="https://profiles.wordpress.org/samuelsidler">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.2.4 is now available. This is a<strong> security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by <a href="https://sucuri.net/">Marc-Alexandre Montpas</a> of Sucuri, <a href="https://helenhousandi.com/">Helen Hou-Sandí</a> of the WordPress security team, <a href="https://www.checkpoint.com/">Netanel Rubin</a> of Check Point, and <a href="https://hackerone.com/reactors08">Ivan Grigorov</a>. It also includes a fix for a potential timing side-channel attack, discovered by <a href="https://www.scrutinizer-ci.com/">Johannes Schmitt</a> of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by <a href="https://www.linkedin.com/in/symbiansymoh">Mohamed A. Baset</a>.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.4 also fixes four bugs. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.4">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=33573&amp;stop_rev=33396">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.4</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.4.</p>
<p><em>Already testing WordPress 4.3? The second release candidate is now available (<a href="https://wordpress.org/wordpress-4.3-RC2.zip">zip</a>) and it contains these fixes. For more on 4.3, see <a href="https://wordpress.org/news/2015/07/wordpress-4-3-release-candidate/">the RC 1 announcement post</a>.</em></p>
<div class="sharedaddy sd-sharing-enabled">
<div class="robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing">
<h3 class="sd-title">Share this:</h3>
</div>
</div>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&#038;title=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/" data-a2a-title="WordPress 4.2.4 Security and Maintenance Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Adding an Admin User to the WordPress Database via MySQL</title>
		<link>https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/</link>
					<comments>https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 01 Jun 2015 18:10:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[add user to dababase]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2910</guid>

					<description><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL             Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in  [...]</p>
<p>The post <a href="https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL</p>
<p><img decoding="async" class="alignleft" src="https://cdn4.wpbeginner.com/blogposts/wpusersinsert.gif" alt="wp-users insert phpmyadmin table" width="520" height="201" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in to the phpMyAdmin and created a new admin user to grant them access. In this article, we will show you a step by step guide on how to create an admin user in WordPress Database via MySQL.</p>
<p>Note: You should always make a backup of your database before performing any MySQL edits. This tutorial requires basic understanding of how phpMyAdmin works.</p>
<p>First, you need to login to phpMyAdmin and locate your WordPress database.</p>
<p>Once inside phpMyAdmin;</p>
<p>Once you are in, we will be making changes to the wp_users and wp_usermeta tables. Lets go ahead and click on wp_users table.</p>
<p>phpMyAdmin wp_users table</p>
<p>We need to insert our new admin user’s information, so click on the Insert tab like it shows in the image above. In the insert form, add the following:</p>
<p>ID – pick a number (in our example, we will use the number 4).<br />
user_login – insert the username you want to use to access the WordPress Dashboard.<br />
user_pass – add a password for this username. Make sure to select MD5 in the functions menu (Refer to the screenshot below).<br />
user_nicename – put a nickname or something else that you would like to refer yourself as.<br />
user_email – add the email you want to associate with this account.<br />
user_url – this would be the url to your website.<br />
user_registered – select the date/time for when this user is registered.<br />
user_status – set this to 0.<br />
display_name – put the name you like to display for this user on the site (it can be your user_nicename value as well).<br />
Click on the Go Button</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&#038;title=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" data-a2a-url="https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/" data-a2a-title="Adding an Admin User to the WordPress Database via MySQL"></a></p><p>The post <a href="https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.2 Security and Maintenance Release</title>
		<link>https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 12 May 2015 22:04:03 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.2 Security and Maintenance Release]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2885</guid>

					<description><![CDATA[<p>WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues:   The Genericons icon font package, which  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><a href="https://wordpress.org/news/2015/05/wordpress-4-2-2/">WordPress 4.2.2 Security and Maintenance Release</a></h2>
<p><a href="https://www.cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg"><img decoding="async" class=" size-medium wp-image-2886 alignleft" src="https://www.cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg" alt="WordPress-logo" width="300" height="159" /></a>Posted May 7, 2015 by <a href="https://samuelsidler.com/">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</p>
<div class="storycontent">
<p>WordPress 4.2.2 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Version 4.2.2 addresses two security issues:</p>
<p>&nbsp;</p>
<ul>
<li>The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on <a href="https://wordpress.org/">WordPress.org</a> (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of <a href="https://netsparker.com">Netsparker</a>.</li>
<li>WordPress versions 4.2 and earlier are affected by a <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/">critical cross-site scripting vulnerability</a>, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi from Baidu[X-team].</li>
</ul>
<p>The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.2">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=32418&amp;stop_rev=32324">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.2</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2.</p>
<p>Thanks to everyone who contributed to 4.2.2:</p>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&#038;title=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/" data-a2a-title="WordPress 4.2.2 Security and Maintenance Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.1 released new patch</title>
		<link>https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 27 Apr 2015 21:48:29 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.1 released new patch]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2364</guid>

					<description><![CDATA[<p>WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability Sarah Gooding April 27, 2015 4 photo credit: Will Montague – ccThis morning we reported on an XSS vulnerability in WordPress 4.2, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and released 4.2.1  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<article id="post-42873" class="entry post publish author-sarah post-42873 format-standard has-post-thumbnail category-news category-wordpressorg post_tag-security">
<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Monday, April 27, 2015, 3:46 pm" datetime="2015-04-27T15:46:07-04:00">April 27, 2015</time> <a class="comments-link" href="https://wptavern.com/wordpress-4-2-1-released-to-patch-comment-exploit-vulnerability#comments">4</a></div>
</header>
<div class="entry-content">
<figure id="attachment_20655" class="wp-caption aligncenter"><a class="img-hyperlink" href="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg" rel="prettyPhoto[42873]"><img decoding="async" class="size-full wp-image-20655" src="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg?resize=1024%2C505" alt="photo credit: Will Montague - cc" width="644" height="318" /></a><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/willmontague/3813295674/">Will Montague</a> – <a href="https://creativecommons.org/licenses/by-nc/2.0/">cc</a></figcaption></figure>
<p>This morning we reported on an <a href="https://wptavern.com/zero-day-xss-vulnerability-in-wordpress-4-2-currently-being-patched" target="_blank">XSS vulnerability in WordPress 4.2</a>, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/" target="_blank">released 4.2.1</a> within hours of being notified.</p>
<p>WordPress’ official statement on the security issue:</p>
<blockquote><p>The WordPress team was made aware of a XSS issue a few hours ago that we will release an update for shortly. It is a core issue, but the number of sites vulnerable is much smaller than you may think because the vast majority of WordPress-powered sites run Akismet, which blocks this attack. When the fix is tested and ready in the coming hours WordPress users will receive an auto-update and should be safe and protected even if they don’t use Akismet.</p></blockquote>
<p>That auto-update is now being rolled out to sites where updates have not been disabled. If you are unsure of whether or not your site can perform automatic background updates, Gary Pendergast linked to the <a href="https://wordpress.org/plugins/background-update-tester/" target="_blank">Background Update Tester</a> plugin in the security release. This is a core-supported plugin that will check your site for background update compatibility and explain any issues.</p>
<p>Since <a href="https://wordpress.org/plugins/akismet/" target="_blank">Akismet</a> is active on more than a million websites, the number of affected users that were not protected is much smaller than it might have been otherwise.</p>
<p>WordPress 4.2.1 is a critical security release for a widely publicized vulnerability that you do not want to ignore. Users are advised to update immediately. The background update may already have hit your site. If not, you can update manually by navigating to Dashboard → Updates.</p>
</div>
</article>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&#038;title=WordPress%204.2.1%20released%20new%20patch" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/" data-a2a-title="WordPress 4.2.1 released new patch"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress Security Alert</title>
		<link>https://cvtfstudios.net/wordpress-security-alert/</link>
					<comments>https://cvtfstudios.net/wordpress-security-alert/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 20:26:39 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Wordpress Security Alert]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2271</guid>

					<description><![CDATA[<p>Wordpress Security Alert - WP Super cache Credit: Wikipedia Upgrade immediately ITWorld|April 8, 2015 Security firm Sucuri revealed on their blog this week that they had uncovered a persistent cross-site scripting vulnerability in the popular Wordpress plugin WP Super Cache. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<header>
<h1>WordPress Security Alert &#8211; WP Super cache</h1>
</header>
<figure class="hero-img"><img decoding="async" src="https://images.techhive.com/images/article/2015/04/three_surveillance_cameras-100577821-primary.idge.jpg" alt="three surveillance cameras" /><figcaption> Credit: <a href="https://www.google.com/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=0CAMQjxw&amp;url=ht" target="_blank" rel="nofollow">Wikipedia</a> </figcaption></figure>
<section class="deck">
<h2>Upgrade immediately</h2>
</section>
<div class="byline">
<p class="dateline">ITWorld<span class="divider">|</span>April 8, 2015</p>
</div>
<section class="bodee">
<div id="drr-container">
<p>Security firm <a href="https://sucuri.net/" target="new">Sucuri</a> revealed on their <a href="https://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html" target="new">blog this week</a> that they had uncovered a persistent <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="new">cross-site scripting</a> vulnerability in the popular WordPress plugin<a href="https://wordpress.org/plugins/wp-super-cache/" target="new"> WP Super Cache</a>. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code into WordPress pages without your knowledge. Anyone who has experienced this type of attack due to a plugin security flaw knows how difficult and time consuming remediation can be.</p>
<figure class="large "><img decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache1-100577816-large.idge.png" alt="supercache1" width="620" height="123" /> <small class="credit">Cypress North</small></figure>
<p>WP Super Cache is deployed across all of the WordPress sites we host in our data center, and for good reason. The excellent plugin dramatically boosts the performance of WordPress sites while simultaneously reducing load on the web servers. The code for this plugin is mature and stable, rarely requiring updates. That&#8217;s part of the reason why it&#8217;s trusted by over 7 million websites. It&#8217;s popularity makes this security flaw a big concern for site owners.</p>
<figure class="medium "><img decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache2-100577820-medium.idge.png" alt="supercache2" width="375" height="480" /> <small class="credit">Cypress North</small></figure>
<p>The update process is quick and easy so you should take the time to log in and click the update now link as soon as you&#8217;re able. If you&#8217;re fortunate enough to maintain your sites under a multi-site install you&#8217;ll be able to take care of this issue in one shot. Otherwise, like us, you&#8217;re stuck logging into each installation and manually updating each site like we spent all yesterday doing.</p>
<p>According to the blog post by <a href="https://blog.sucuri.net/author/marc" rel="author">Marc-Alexandre Montpas</a>:</p>
<blockquote><p>Using this vulnerability, an attacker using a carefully crafted query could insert malicious scripts to the plugin’s cached file listing page. As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site’s administrator to have a look at that particular section, manually.</p></blockquote>
<p>The nonce requirement lowers the odds of the backdoor taking effect since the cached page gets purged periodically, but still, better safe than sorry. The scale of the vulnerable sites makes exploitation an inevitable event. Do your part to protect the web and get updating.</p>
</div>
</section>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&#038;title=WordPress%20Security%20Alert" data-a2a-url="https://cvtfstudios.net/wordpress-security-alert/" data-a2a-title="WordPress Security Alert"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-security-alert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.0.1 Security Release</title>
		<link>https://cvtfstudios.net/wordpress-4-0-1-security-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-0-1-security-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:54:13 +0000</pubDate>
				<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[WordPress 4.0.1 Security Release]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1805</guid>

					<description><![CDATA[<p>Posted November 20, 2014 by Andrew Nacin. Filed under Releases, Security. WordPress 4.0.1 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours. If you  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-0-1-security-release/">WordPress 4.0.1 Security Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="meta">Posted November 20, 2014 by <a href="https://nacin.com/">Andrew Nacin</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.0.1 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours.</p>
<p>If you are still on WordPress 3.9.2, 3.8.4, or 3.7.4, you will be updated to 3.9.3, 3.8.5, or 3.7.5 to keep everything secure.</p>
<p>(We don’t support older versions, so please update to 4.0.1 for the latest and greatest.)</p>
<p>WordPress versions 3.9.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. This was reported by <a href="https://klikki.fi/">Jouko Pynnonen</a>. This issue does not affect version 4.0, but version 4.0.1 does address these eight security issues:</p>
<ul>
<li>Three cross-site scripting issues that a contributor or author could use to compromise a site. Discovered by <a href="https://joncave.co.uk/">Jon Cave</a>, <a href="https://www.miqrogroove.com/">Robert Chapin</a>, and <a href="https://johnblackbourn.com/">John Blackbourn</a> of the WordPress security team.</li>
<li>A cross-site request forgery that could be used to trick a user into changing their password.</li>
<li>An issue that could lead to a denial of service when passwords are checked. Reported by <a href="https://www.behindthefirewalls.com/">Javier Nieto Arevalo</a> and <a href="https://www.devconsole.info/">Andres Rojas Guerrero</a>.</li>
<li>Additional protections for server-side request forgery attacks when WordPress makes HTTP requests. Reported by Ben Bidner (vortfu).</li>
<li>An extremely unlikely hash collision could allow a user’s account to be compromised, that also required that they haven’t logged in since 2008 (I wish I were kidding). Reported by <a href="https://david.dw-perspective.org.uk">David Anderson</a>.</li>
<li>WordPress now invalidates the links in a password reset email if the user remembers their password, logs in, and changes their email address. Reported separately by <a href="https://twitter.com/MomenBassel">Momen Bassel</a>, <a href="https://c0dehouse.blogspot.in/">Tanoy Bose</a>, and <a href="https://managewp.com/">Bojan Slavković of ManageWP</a>.</li>
</ul>
<p>Version 4.0.1 also fixes 23 bugs with 4.0, and we’ve made two hardening changes, including better validation of EXIF data we are extracting from uploaded photos. Reported by <a href="https://www.securesolutions.no/">Chris Andrè Dale</a>.</p>
<p>We appreciated the <a href="https://codex.wordpress.org/FAQ_Security">responsible disclosure</a> of these issues directly to our security team. For more information, see the <a href="https://codex.wordpress.org/Version_4.0.1">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.0?rev=30475&amp;stop_rev=29710">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.0.1</a> or venture over to <strong>Dashboard → Updates</strong> and simply click “Update Now”.</p>
<p><em>Already testing WordPress 4.1? The second beta is now available (<a href="https://wordpress.org/wordpress-4.1-beta2.zip">zip</a>) and it contains these security fixes. For more on 4.1, see <a href="https://wordpress.org/news/2014/11/wordpress-4-1-beta-1/">the beta 1 announcement post</a>.</em></p>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&#038;title=WordPress%204.0.1%20Security%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-0-1-security-release/" data-a2a-title="WordPress 4.0.1 Security Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-0-1-security-release/">WordPress 4.0.1 Security Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-0-1-security-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Zero-Day Vulnerability Discovered in TimThumb Script</title>
		<link>https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/</link>
					<comments>https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:51:21 +0000</pubDate>
				<category><![CDATA[Media]]></category>
		<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[New Zero-Day Vulnerability]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1803</guid>

					<description><![CDATA[<p>WordPress Security Alert: New Zero-Day Vulnerability Discovered in TimThumb Script Sarah Gooding June 25, 2014 20 photo credit: kama17 – cc Security vulnerabilities have plagued the TimThumb script for years. It is most commonly used in cropping, zooming and resizing images in WordPress themes. After the large scale attacks launched against the script a few  [...]</p>
<p>The post <a href="https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/">New Zero-Day Vulnerability Discovered in TimThumb Script</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress Security Alert: New Zero-Day Vulnerability Discovered in TimThumb Script</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Wednesday, June 25, 2014, 2:48 pm" datetime="2014-06-25T14:48:35-05:00">June 25, 2014</time> <a class="comments-link" title="Comment on WordPress Security Alert: New Zero-Day Vulnerability Discovered in TimThumb Script" href="https://wptavern.com/wordpress-security-alert-new-zero-day-vulnerability-discovered-in-timthumb-script#comments">20</a></div>
</header>
<div class="entry-content">
<figure id="attachment_25334" class="wp-caption aligncenter" style="width: 719px; text-align: justify;"><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/kama17/9279705214/">kama17</a> – <a href="https://creativecommons.org/licenses/by/2.0/">cc</a></figcaption></figure>
<p style="text-align: justify;">Security vulnerabilities have <a href="https://wptavern.com/timthumb-vulnerability-bites-another-victim" target="_blank">plagued</a> the <a href="https://timthumb.googlecode.com/svn/trunk/timthumb.php" target="_blank">TimThumb</a> script for years. It is most commonly used in cropping, zooming and resizing images in WordPress themes. After the <a href="https://blog.sucuri.net/2011/08/attacks-against-timthumb-php-in-the-wild-list-of-themes-and-plugins-being-scanned.html" target="_blank">large scale attacks</a> launched against the script a few years ago, one might think that theme and plugin developers would be less likely to continue building with it. However, this is not the case and many websites are again in danger, according to the exploit <a href="https://cxsecurity.com/issue/WLB-2014060134" target="_blank">disclosure</a> issued today.</p>
<p style="text-align: justify;">TimThumb 2.8.13 has a vulnerability with its “Webshot” feature that, when enabled, allows attackers to execute commands on a remote website. At this time there is no patch. Security experts at Sucuri <a href="https://blog.sucuri.net/2014/06/timthumb-webshot-code-execution-exploit-0-day.html" target="_blank">break down the threat</a> as follows: <strong>“With a simple command, an attacker can create, remove and modify any files on your server.”</strong></p>
<p style="text-align: justify;">Although the Webshot feature should be disabled by default, Sucuri recommends that you check your timthumb file to make sure it’s disabled. Search for “WEBSHOT_ENABLED” and verify that it’s set to “false,” as shown below:</p>
<div id="highlighter_314875" class="syntaxhighlighter nogutter taverncode " style="text-align: justify;">
<div class="lines">
<div class="line alt1">
<table>
<tbody>
<tr>
<td class="content"><code class="plain">define (‘WEBSHOT_ENABLED’, false);</code></td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
<p style="text-align: justify;">This vulnerability affects many WordPress themes, plugins, and third party components. According to the disclosure, all themes from <a href="https://themify.me/" target="_blank">Themify</a> utilize this script, as well as several plugins, including <a href="https://wordpress.org/plugins/wordpress-gallery-plugin/" target="_blank">WordPress Gallery Plugin</a> and the <a href="https://wordpress.org/plugins/igit-posts-slider-widget/" target="_blank">IGIT Posts Slider Widget</a>.</p>
<p style="text-align: justify;">It’s important to recognize that your theme or plugin may also use this script, even if it’s not listed in the disclosure. If you’ve ever lost an entire weekend fixing client sites that fell victim to TimThumb exploits, then you know that disabling the WebShot option is probably a good idea. This is a simple thing that you can do now to prevent your sites from getting hacked.</p>
<div id="better-author-bio-div">
<div class="better-author-bio-div-info"><img decoding="async" id="grav-d12f506a8f9afba443178608fc9e2232-0" class="avatar avatar-60 photo grav-hashed grav-hijack" src="https://1.gravatar.com/avatar/d12f506a8f9afba443178608fc9e2232?s=60&amp;d=&amp;r=R" alt="" width="60" height="60" /></p>
<h4 class="font-headlines" style="text-align: justify;">Who is Sarah Gooding</h4>
<p class="better-author-bio-div-meta" style="text-align: justify;">Sarah Gooding is an Editorial Ninja at Audrey Capital. When not writing about WordPress, she enjoys baking, knitting, judging beer competitions and spending time with her Italian Greyhound.</p>
</div>
</div>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&#038;title=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" data-a2a-url="https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/" data-a2a-title="New Zero-Day Vulnerability Discovered in TimThumb Script"></a></p><p>The post <a href="https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/">New Zero-Day Vulnerability Discovered in TimThumb Script</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
