首页CMS再次更新升级WordPress 5.0.1 安全漏洞尽快更新

再次更新升级WordPress 5.0.1 安全漏洞尽快更新

时间2024-05-24 00:18:03发布访客分类CMS浏览744
导读:老蒋对于WordPress程序的整体感觉还是不错的,但是特别不喜欢前一天才升级更新,后面又来一个补丁。要更新升级能不能一次完成?这次升级5.0的时候没有安全更新,估计看到大家都没有升级,因为不喜欢Gutenberg编辑器,于是乎来一个安全补...

老蒋对于WordPress程序的整体感觉还是不错的,但是特别不喜欢前一天才升级更新,后面又来一个补丁。要更新升级能不能一次完成?这次升级5.0的时候没有安全更新,估计看到大家都没有升级,因为不喜欢Gutenberg编辑器,于是乎来一个安全补丁更新,看你升级不?

如果我们有在用WordPress非最新版本的话,建议升级,因为有安全补丁。

1、authors could alter meta data to delete files that they weren’t authorized to.

2、authors could create posts of unauthorized post types with specially crafted input.

3、contributors could craft meta data in a way that resulted in PHP object injection.

4、contributors could edit new comments from higher-privileged users, potentially leading to a cross-site scripting vulnerability.

5、specially crafted URL inputs could lead to a cross-site scripting vulnerability in some circumstances. WordPress itself was not affected, but plugins could be in some situations.

6、the user activation screen could be indexed by search engines in some uncommon configurations, leading to exposure of email addresses, and in some rare cases, default generated passwords.

7、authors on Apache-hosted sites could upload specifically crafted files that bypass MIME verification, leading to a cross-site scripting vulnerability.

如果我们在升级之后是强制有安装Gutenberg编辑器的,如果我们不喜欢可以参考"禁用WordPress Gutenberg古腾堡编辑器两个方法"禁止掉。

声明:本文内容由网友自发贡献,本站不承担相应法律责任。对本内容有异议或投诉,请联系2913721942#qq.com核实处理,我们将尽快回复您,谢谢合作!


若转载请注明出处: 再次更新升级WordPress 5.0.1 安全漏洞尽快更新
本文地址: https://pptw.com/jishu/666662.html
WordPress控制内容只在首页/内容页/单页显示方法 CSS实现段落首字母,首字放大特效,效果非常不错

游客 回复需填写必要信息