by admin | Jan 10, 2018 | vulnerability |
An industry-wide, hardware-based CPU security vulnerability was disclosed, called Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715). For vulnerability details, you may refer to https://access.redhat.com/security/vulnerabilities/speculativeexecution...
by admin | Aug 17, 2017 | how-to |
Purpose: If you WordPress website is hacked or infected malware, you may try to follow this guide for Malware Removal, and Recover your Hacked WordPress website. Disclaimer: The information on this site is for information only. Whilst we endeavor to ensure the...
by admin | Jul 21, 2016 | vulnerability |
A vulnerability report was released in Apache. For details, you may refer to https://www.apache.org/security/asf-httpoxy-response.txt https://access.redhat.com/security/vulnerabilities/httpoxy It involves the web server and PHP level. If you are using sharing...
by admin | Jun 2, 2016 | vulnerability |
A remote arbitrary file upload vulnerability found in WP Mobile detector. Users of WP Mobile detector are recommended to update the plugin immediately to version 3.8 onwards. Ref.: Arbitrary File Upload Vulnerability in WP Mobile Detector...
by admin | May 5, 2016 | vulnerability |
ImageMagick is a common graphic library in Linux to manipulate images (e.g. resize, crop, etc). It appears in most gallery functionality. Recently, ImageMagick contains remote arbitrary code execution vulnerability. If your WordPress plugins use ImageMagick,...
Recent Comments