HEX
Server: Apache/2
System: Linux server.vm113-cu.cl1.il.proginter.com 4.18.0-553.78.1.el8_10.x86_64 #1 SMP Tue Oct 7 04:15:13 EDT 2025 x86_64
User: regevl (1053)
PHP: 7.4.33
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/regevl/Maildir/new/1614026527.M553650P9171.server.vps4552-cu.uk.proginter.com,S=2004,W=2048
Return-Path: <regevl910@gmail.com>
Delivered-To: regevl@tll-hospitality.co.il
Received: from server.vps4552-cu.uk.proginter.com
	by server.vps4552-cu.uk.proginter.com with LMTP
	id KM3uIB8XNGDTIwAA0tGqwA
	(envelope-from <regevl910@gmail.com>)
	for <regevl@tll-hospitality.co.il>; Mon, 22 Feb 2021 22:42:07 +0200
Return-path: <regevl910@gmail.com>
Envelope-to: regevl@tll-hospitality.co.il
Delivery-date: Mon, 22 Feb 2021 22:42:07 +0200
Received: from root by server.vps4552-cu.uk.proginter.com with local (Exim 4.94)
	(envelope-from <regevl910@gmail.com>)
	id 1lEI1v-0002SX-GB
	for regevl@tll-hospitality.co.il; Mon, 22 Feb 2021 22:42:07 +0200
To: regevl@tll-hospitality.co.il
Subject: [Installatron] WordPress 4.8.12 now available (security release)
Date: Mon, 22 Feb 2021 22:42:07 +0200
From: regevl910@gmail.com
Message-ID: <393677d0bceab1d96d43546204d0c272@server.vps4552-cu.uk.proginter.com>
X-Mailer: Installatron Plugin 9.1.54
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8

This is an automated email from Installatron. To unsubscribe from these emails or to change notification settings, login to your web hosting control panel, navigate to the Installatron tool, and select the installed applications you wish to modify.

An update to WordPress 4.8.12 (security release) is now available for the WordPress installations you are managing using Installatron. The following can be updated:

- http://group.kingdavid-residence.co.il


The changes for this version are:

WordPress 4.8.12 fixes 4 security issues.

Security
* Fixed an issue where an unprivileged user could make a post sticky via the REST API.
* Fixed an issue where cross-site scripting (XSS) could be stored in well-crafted links.
* Hardened wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute.
* Fixed a stored XSS vulnerability using block editor content.

Login to your web hosting control panel and navigate to the Installatron tool to update your installed applications.

End of report.