HEX
Server: Apache/2
System: Linux server.vm113-cu.cl1.il.proginter.com 4.18.0-553.78.1.el8_10.x86_64 #1 SMP Tue Oct 7 04:15:13 EDT 2025 x86_64
User: regevl (1053)
PHP: 7.4.33
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/regevl/Maildir/new/1604068803.M346128P21132.server.vps4552-cu.uk.proginter.com,S=1987,W=2031
Return-Path: <regevl910@gmail.com>
Delivered-To: regevl@tll-hospitality.co.il
Received: from server.vps4552-cu.uk.proginter.com
	by server.vps4552-cu.uk.proginter.com with LMTP
	id KL2SFMMlnF+MUgAA0tGqwA
	(envelope-from <regevl910@gmail.com>)
	for <regevl@tll-hospitality.co.il>; Fri, 30 Oct 2020 16:40:03 +0200
Return-path: <regevl910@gmail.com>
Envelope-to: regevl@tll-hospitality.co.il
Delivery-date: Fri, 30 Oct 2020 16:40:03 +0200
Received: from root by server.vps4552-cu.uk.proginter.com with local (Exim 4.94)
	(envelope-from <regevl910@gmail.com>)
	id 1kYVZT-0005Zx-9o
	for regevl@tll-hospitality.co.il; Fri, 30 Oct 2020 16:40:03 +0200
To: regevl@tll-hospitality.co.il
Subject: [Installatron] WordPress 4.9.13 now available (security release)
Date: Fri, 30 Oct 2020 16:40:03 +0200
From: regevl910@gmail.com
Message-ID: <bc451195f434768ebe839157b6163e39@server.vps4552-cu.uk.proginter.com>
X-Mailer: Installatron Plugin 9.1.53
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8

This is an automated email from Installatron. To unsubscribe from these emails or to change notification settings, login to your web hosting control panel, navigate to the Installatron tool, and select the installed applications you wish to modify.

An update to WordPress 4.9.13 (security release) is now available for the WordPress installations you are managing using Installatron. The following can be updated:

- http://signhere.co.il


The changes for this version are:

WordPress 4.9.13 fixes 4 security issues.

Security
* Fixed an issue where an unprivileged user could make a post sticky via the REST API.
* Fixed an issue where cross-site scripting (XSS) could be stored in well-crafted links.
* Hardened wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute.
* Fixed a stored XSS vulnerability using block editor content.

Login to your web hosting control panel and navigate to the Installatron tool to update your installed applications.

End of report.