Server Solutions
Dedicated Server Rental Meet your physical server needs with dedicated server rental Explore Now
Virtual Servers Scalable, high-availability server rental services with our high-performance cloud server solutions. Explore Now
İlkbyte Cloud Fully developed by Netinternet, flexible and scalable cloud servers with cloud technology Explore Now
GPU-Based AI Infrastructure High-performance GPU solutions created on a project basis for your AI and machine learning projects Explore Now
Server & Hardware Procurement Server and hardware procurement services with equipment suitable for your projects Explore Now
Customized Infrastructure Solutions Custom-designed infrastructure solutions and technical consulting services for your unique needs Explore Now
Hosting Services
Cabinet Rental Dedicated 15U, 24U and 48U smart cabinet systems allocated for you Explore Now
Server Colocation Individual server hosting service in shared cabinet systems Explore Now
Premium Connectivity Fast and reliable internet access with multi-carrier, multi-IXP and high-capacity Anti-DDoS protection Explore Now
Telecom Data Center Circuit Low-cost and high-performance internet access through a dedicated data center tariff Explore Now
Cross-Connect Direct connection between network carriers with low latency and high performance Explore Now
IP Address Pricing IP address and ASN rental services with RIPE LIR management services Explore Now
Managed Services
Managed Server Installation, configuration, regular maintenance, updates and 24/7 monitoring of your server operating system Explore Now
Managed Infrastructure End-to-end management of your entire IT infrastructure including data center, storage, virtualization and backup Explore Now
Managed Network Professional management and monitoring of network devices (router, switch, firewall) configuration, optimization and performance Explore Now
Managed Cloud (Public / Private) Professional management of your public and private cloud infrastructures to meet your cloud needs Explore Now
Managed Security 24/7 monitoring, analysis and response services against cyber security threats Explore Now
Managed Backup & Disaster Recovery Backup and disaster recovery plans, implementation, operation to ensure your data security and business continuity Explore Now
License Rental
cPanel Licenses cPanel software license rental solutions Explore Now
Plesk Licenses Plesk software license rental solutions Explore Now
DirectAdmin Licenses DirectAdmin software license rental solutions Explore Now
LiteSpeed Licenses LiteSpeed software license rental solutions Explore Now
CloudLinux Licenses CloudLinux software license rental solutions Explore Now
Cyber Security
HEIMWALL Fully developed by Netinternet, protect against cyber attacks with our Web Application Firewall solution Explore Now →
AntiDDoS High-capacity volumetric Anti-DDoS protection provided free by default on all our services Explore Now →
VPN Solutions Secure, encrypted tunnel connections for your remote offices and employees with our managed VPN solutions Explore Now →
Layer4 Stateless Firewall Layer4 stateless firewall solution for filtering and directing incoming traffic Explore Now →
SSL Certificates Secure connection solutions with free and paid SSL/TLS certificate options Explore Now →
Penetration Tests Penetration tests performed by third parties in cooperation with TSE-approved testing firms Explore Now →
Corporate Email
Corporate Email Solutions Fully domestic, KVKK compliant, 100% compatible with Outlook and all mail programs, professional, uninterrupted email service Explore Now →
Bulk Email Sending Manageable bulk email sending services with high delivery rates for your marketing campaigns Explore Now →
Email Archiving Secure archiving of all your email traffic to protect corporate memory and comply with legal requirements Explore Now →
Free Email Migration Service Wherever your email service is, we migrate you to Netinternet corporate email solution for free! Explore Now →
Traditional Web Hosting
cPanel Web Hosting Fast and reliable hosting packages with easy setup and management using cPanel, the world's most popular hosting management panel. Explore Now →
cPanel Reseller Hosting Fully customizable cPanel-based reseller hosting solution for starting your own hosting business Explore Now →
DirectAdmin Reseller Hosting Scalable and cost-effective reseller hosting powered by lightweight DirectAdmin control panel Explore Now →
Free Hosting Migration Service Professional migration services to move your existing systems to Netinternet data center infrastructure Explore Now →
Domain Names
Domain Registration Services Domain registration and easy management at the most affordable prices in all popular extensions (.com, .net, .org, etc.) Explore Now →
Domain Transfer Services Transfer your domains to Netinternet for professional domain management services Explore Now →
Domain Reseller Flexible and reliable reseller program and integration services for offering domain registration to your customers Explore Now →
Free Hosting with Domain Free hosting service for domains registered or transferred to Netinternet Explore Now →
Hosting & Cloud Service Providers High-density infrastructures, multi-tenant architectures and SLA-focused sustainable data center solutions for hosting and cloud providers Explore Now →
E-Commerce Companies High-performance, secure and uninterrupted e-commerce infrastructures resilient to sudden traffic surges during campaign periods Explore Now →
Software Developers Developer-friendly infrastructure solutions with CI/CD compatible, API-supported, automation-ready flexible resource management Explore Now →
SaaS Providers Scalable, high-availability and continuity-focused cloud infrastructures suitable for SaaS architectures serving many users. Explore Now →
AI & R&D GPU-based high-performance and scalable infrastructures for big data processing, model training and high computation tasks Explore Now →
Agencies & Marketing Multi-client management compatible, quick setup, high-performance and flexible web hosting infrastructures Explore Now →
Media & Broadcasting High bandwidth and low latency infrastructure solutions for live streaming, video and heavy content traffic Explore Now →
Banks & Fintech Regulation-compliant, Tier-3/Tier-4 standard, highly secure financial infrastructures ensuring uninterrupted service Explore Now →
Government & Education Long-term, sustainable and secure infrastructure solutions compliant with regulations and data security requirements Explore Now →
Manufacturing / Industry Low-latency and high-availability infrastructure solutions compatible with Industry 4.0, IoT and production automation systems Explore Now →
Healthcare Organizations Highly secure and uninterrupted health informatics infrastructures prioritizing patient data privacy and continuity Explore Now →
HEIMWALL – Web Application Firewall Protect your web applications against advanced attacks with our 100% domestic WAF platform HEIMWALL Explore Now →
Ilkbyte - Cloud Server Service Scalable and high-performance cloud servers deployable in seconds with our domestically developed orchestration infrastructure Explore Now →
Netrafix - Bandwidth Monitoring Manage 5651 compliant logging and bandwidth billing (Burst, Traffic Quota, 95th Percentile) in one platform with sFlow, NetFlow and IPFIX supported Netrafix Explore Now →
Secure Internet - For ISPs Keep your DNS traffic in your own network with 100% domestic DNS software developed for authorized ISPs Explore Now →
DirectIP - IP Management System 100% domestic IP management platform developed by Netinternet for centralized IP address, subnet, VLAN and DHCP management Explore Now →
RuleDNS - Rule-Based DNS Management Dynamically manage DNS responses with rule-based RuleDNS, easily integrate CDN and services with API support Explore Now →
Documents / Whitepapers Developer-focused technical documentation covering all API endpoints, usage scenarios and automation examples Explore Now →
API Documentation Developer-focused technical documentation covering API endpoints, usage scenarios and automation examples for platform integration Explore Now →
Peering Policies Reference policies transparently explaining our network architecture, traffic exchange principles and peering criteria Explore Now →
Frequently Asked Technical Questions Clear and actionable answers to the most frequently asked technical questions about infrastructure, security and operations Explore Now →
System Status Status page transparently sharing real-time status, planned maintenance and past outages of all platforms and services Explore Now →
Our Physical Data Center
Our Physical Data Center Our corporate data center facility designed with high security standards and redundant power and cooling infrastructure Explore Now →
Power, Cooling, Security Facility architecture designed for critical infrastructures with redundant power lines, climate systems and multi-layered physical security Explore Now →
Internet Access Points Low-latency and high-availability backbone connections through multiple operators and internet exchange points Explore Now →
Network Infrastructure
Network Infrastructure Uninterrupted connectivity infrastructure with multi-carrier connections, redundant backbone and high-capacity network architecture Explore Now →
Network Policies Sustainable network operation policies with transparently defined rules for traffic management, peering, security and capacity usage Explore Now →
Planning and Processes Scalable and controlled network management approach with pre-designed network capacity planning, growth scenarios and operational processes Explore Now →
Certificates and Documents
Our Certifications We provide auditable and sustainable infrastructure standards with our certifications for information security and service continuity Explore Now →
Security Policy We ensure protection of infrastructure and data with our security policies covering information security, access control and risk management Explore Now →
KVKK Compliance Data processing and storage structure compliant with KVKK and related regulations with defined technical and administrative measures for personal data protection. Explore Now →
Quality Policy Our quality management policies within the scope of ISO 9001 for continuous improvement of service quality. Explore Now →
Service Management Policy Our policies and standards governing IT service management processes within the scope of ISO/IEC 20000-1. Explore Now →
Business Continuity Policy Our ISO 22301 compliant policies and procedures ensuring business continuity against possible outage scenarios. Explore Now →
Incident Management Policy Our incident management processes and action plans for the detection, response and resolution of security incidents. Explore Now →
Supplier Security Policy Our policy governing information security requirements and risk assessment processes in supplier relationships. Explore Now →
Disclosure Text Text prepared within the scope of our disclosure obligation regarding the processing of your personal data under KVKK. Explore Now →
Cookie Policy Our policy regarding cookies and data collection practices used on our website. Explore Now →
Hosting Provider and Legal Obligation Policy Legal obligations we fulfill as a hosting provider under Law No. 5651. Explore Now →
Blog Posts Technical analyses, sector evaluations and current content about data center, network, cyber security and cloud technologies Explore Now →
Case Studies Reference case studies describing needs encountered, solutions applied and outcomes achieved in real projects Explore Now →
Events and Announcements Events we attend and organize, technical meetings, launches and current announcements about Netinternet Explore Now →
19 Years of Experience

Blog Posts

Discover the success stories of our customers' digital transformation journeys. Each project demonstrates the power of our reliable infrastructure.

Başarı Hikayeleri
Webmaster
1255 Hit
2 Comments

Mozilla Released Security Updates

General Information


Mozilla released security updates to address a total of 20 vulnerabilities, 7 of which are critical, found in its Firefox 57 and Firefox ESR 52.5 products.


Impact


Due to existing security vulnerabilities, it is possible for target systems to be compromised by cyber attackers.


Solution


Netinternet recommends its users and customers to review the security advisory published for Firefox 57 and Firefox ESR 52.5 and apply the updates published for these products.


Sources


https://www.us-cert.gov/ncas/current-activity/2017/11/14/Mozilla-Releases-Security-Updates


https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/


https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/

1255 Hit
0 Comments
View Details
Webmaster
1065 Hit
2 Comments

Cisco Released Security Updates

General Information


Cisco released a security update addressing the unauthorized access vulnerability found in the Voice Operating System software platform.


Impact


Due to the existing security vulnerability, it is possible for affected systems to be taken under control by cyber attackers.


Solution


Netinternet recommends that its users and system administrators review the Cisco Security advisories for the vulnerability stated to be of high importance and take the relevant security measures.


Sources


https://www.us-cert.gov/ncas/current-activity/2017/11/15/Cisco-Releases-Security-Update


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-vos

1065 Hit
0 Comments
View Details
Webmaster
1219 Hit
2 Comments

Microsoft Released November 2017 Security Updates

1219 Hit
0 Comments
View Details
İnternet
1324 Hit
2 Comments

Nginx Configuration to Improve PageSpeed Score (Ubuntu 16.04)

Introduction


In this article, we will make some Nginx configurations to improve your website’s response time and speed. The goal is to increase the Google PageSpeed score and achieve a score above 80100.


Requirements



  • A server with Ubuntu 16.04 installed.

  • Having root privileges.

  • nginx web server.


Step 1 - Getting the PageSpeed Score


You can get your website’s current PageSpeed score from this URL.

current pagespeed score


Step 2 - Enabling Compression


If your CSS, JavaScript and image files are large, the amount of data that site visitors need to download will increase. This can cause slowness. Compression reduces this data to a smaller, more compact version. Gzip compression is a method that can be used in Nginx. When Gzip compression is enabled, browsers can download content faster; therefore, it helps increase the score on PageSpeed.


To enable compression, open your site’s Nginx configuration file with nano or a similar text editor:


sudo nano /etc/nginx/sites-available/default

You will encounter a configuration like the following.


server {
listen 80 default_server;
listen [::]:80 default_server;

}

Enter the following lines below the code and set the compression level.


server {
listen 80 default_server;
listen [::]:80 default_server;

gzip on;
gzip_comp_level    5;

}


For the compression value, you can choose a number between 1 and 9. The value 5 is a good value in terms of CPU usage and provides approximately 75% compression for most ASCII files (approximately the same as level 9).



gzip_comp_level 5;
gzip_min_length 256;
gzip_proxied any;
gzip_vary on;

Let us also explain these few lines we added:
The gzip_min_length value is entered to prevent small files from being compressed further.
The gzip_proxied value enables compression for those using a proxy like Cloudflare.
gzip_vary is entered for browsers to cache both the compressed content and the normal version.


Finally, specify the MIME types for the content you want to compress. We compress images, JSON data, javascript files and other common content:


server {
listen 80 default_server;
listen [::]:80 default_server;

gzip on;
gzip_comp_level    5;
gzip_min_length    256;
gzip_proxied       any;
gzip_vary          on;

gzip_types
application/atom+xml
application/javascript
application/json
application/ld+json
application/manifest+json
application/rss+xml
application/vnd.geo+json
application/vnd.ms-fontobject
application/x-font-ttf
application/x-web-app-manifest+json
application/xhtml+xml
application/xml
font/opentype
image/bmp
image/svg+xml
image/x-icon
text/cache-manifest
text/css
text/plain
text/vcard
text/vnd.rim.location.xloc
text/vtt
text/x-component
text/x-cross-domain-policy;
# text/html is always compressed by gzip module

location ~*  .(jpg|jpeg|png|gif|ico|css|js|pdf)$ {
    expires 7d;
}

}


We entered the location line for browser cache configuration.


The entire configuration we entered will be like this. Save and close the file.


You can check whether there are any erroneous lines in the configuration we entered with the following command;


sudo nginx -t

Then we restart the nginx service for the configurations we entered to become active.


sudo systemctl restart nginx

Step 3 - Measure the Results


To check which PageSpeed score these configurations affect, analyze your website again through PageSpeed. You will see that the compression and browser caching warnings are gone:


pagespeed final image


Conclusion


Our goal was to achieve a score above 80. If your results are still below 80 points after making these configurations, there may be other settings you need to pay attention to. The score you receive will vary depending on the content of your website. Google PageSpeed will tell you what needs to be adjusted. Changing your Nginx configuration is just one method of improving PageSpeed and may not be sufficient on its own.

1324 Hit
0 Comments
View Details
Webmaster
1156 Hit
2 Comments

Icinga and Icinga Web on Ubuntu

Icinga and Icinga Web on Ubuntu
“Introduction”
Icinga is a flexible and powerful open source monitoring system used to check the health of network-connected servers and services. It can be used to monitor process load and uptime, free disk space on a storage device, memory consumption in a caching service, and more. Once properly installed, Icinga can give you an overview of the status of many hosts and services, as well as notifications, downtime scheduling, and long-term storage of performance data.
“Requirements”
What you need before getting started;
An Ubuntu 16.04 server with LAMP installed. You must enable free SSL for Apache since Icinga Web has a login page, which requires entering some sensitive information during setup.
“Installation”
To get the latest version of Icinga, we first use the following command


curl -sSL https://packages.icinga.com/icinga.key | sudo apt-key add -

This key will be used to automatically verify the integrity of all software we download from the Icinga repository.


Open the file with a text editor “nano”


sudo nano /etc/apt/sources.list.d/icinga.list

This will open a new empty text file. Paste the following line


/etc/apt/sources.list.d/icinga.list
deb https://packages.icinga.com/ubuntu icinga-xenial main

Save and close the file, then refresh the package cache


sudo apt-get update

apt-get will now download information from the repository we added and make Icinga packages available for installation


sudo apt-get install icinga2 icinga2-ido-mysql

This software will load Icinga and other information into a MySQL database and will present a few configuration screens


• Should the ido-mysql feature of Icinga2 be enabled? YES


• Should the database for icinga2-ido-mysql be configured with dbconfig-common? YES


• Then you will be asked to enter a password. Create a strong password and save it so you don’t forget it.


We also enable the command feature that will allow us to execute checks from the web interface.


sudo icinga2 feature enable ido-mysql command

Now you can restart Icinga


sudo systemctl restart icinga2

And finally, let us check to make sure Icinga2 is working properly


sudo systemctl status icinga2

“Icinga Web Installation”
Icinga can be used completely without a web interface, but the web interface provides an overview of the health status of your services as well as the ability to send notifications.


sudo apt-get install icingaweb2

The rest of the setup is done in a web browser. Before proceeding, let us edit the PHP configuration file due to timezone requirements.


sudo nano /etc/php/7.0/apache2/php.ini

We need to find a specific line to update. In Nano, we can press CTRL-W to bring up a search interface, type date.timezone and press ENTER. The cursor moves to the line we will update. First, remove the comment at the beginning of the line by removing the semicolon, and type the correct timezone. You can find the correct timezone format at the following link.
https://secure.php.net/manual/en/timezones.europe.php
When you are done, it should look something like this


date.timezone = Europe/Istanbul

Save and close the file. Restart Apache to apply the update


sudo systemctl restart apache2

1156 Hit
0 Comments
View Details
Servisler
759 Hit
2 Comments

How to Monitor Traffic Usage on Netinternet Physical Servers?

Introduction


Whether you use web hosting or a server, there is always a traffic limit on the services you use when publishing your websites or projects on the internet. Although many companies today provide unlimited traffic services, technically nothing in nature is truly unlimited. It is presented as unlimited traffic only because the extra usage you consume is not charged. However, if you are not using unlimited traffic services, it will be useful for you to monitor the traffic you use. This way, you can avoid high-cost overage invoices.


Traffic Usage Monitoring at Netinternet


For the physical dedicated server and colocation services you receive, we allow you to monitor how much traffic your server uses through your customer panel. This way, you can compare the traffic limit you purchased with the traffic you use and switch to a higher traffic package based on your needs. This prevents extra invoices that may be generated as traffic overage charges. Now let us look at how you can monitor traffic usage on the physical server service you have received from our company.


NOTE: In order to monitor traffic usage on your physical server, traffic reports must be active. If you cannot see traffic reports, please contact technical support.


First, log in to your customer panel from the Customer Login section on our website. After logging into the panel, click on the Services section in the top menu to navigate to the section where all your services are listed.



When you enter the Services section, you will see all active and passive services you have purchased from our company as a list. If you have too many services, you can search for your service from the Search section or select the relevant service from the Filter section to display only the service whose traffic reports you want to monitor. After reaching your service in the list, click the View button on the right to navigate to the features section of your service.



When you enter the features section, on the page that appears, you will see the following sections in the left menu,



  • Information

  • Traffic Reports

  • Service Cancellation


When you click on the Traffic Reports section, you will have accessed the traffic reports of your relevant server. You can examine all your traffic consumption in detail, both daily and monthly, from the day your server was activated. Please note that the data here does not come in real-time; daily reports are delivered.



Thanks to this reporting process we provide to you, you can easily monitor how much traffic you use. This way, you can purchase traffic packages according to your needs.

759 Hit
0 Comments
View Details
Müşteri Paneli
976 Hit
2 Comments

Discount on Foreign Currency-Indexed Products

Dear Customers,


With the decline in exchange rates for foreign currency-indexed products, our prices have been updated, meaning a discount has been applied. New prices are valid as of today for newly generated invoices and new orders.


Rest assured that declines in exchange rates will continue to be reflected as discounts on services priced in Turkish Lira.


We also recommend that you review our announcement regarding foreign currency-indexed products; About the Transition to Foreign Currency-Based Pricing


We present this for your information and wish you good work.




Netinternet Bilisim Teknolojileri AS

General Manager - Osman Makal

976 Hit
0 Comments
View Details
Webmaster
1115 Hit
2 Comments

Security Advisory TR-17-069 VAULT 7 (USOM)

General Information


Since August 2016, a hacker group called “Shadow Brokers” has been publishing information, exploit codes, and malware belonging to a cyber espionage unit called “Equation Group”. In addition to the published data going back to January 2009, it contains detailed information about cyber security vulnerabilities targeting various operating systems and software published to date.

The published exploit codes also target network devices used in institutions. In addition, it has been observed that malware targeting end-user computers is among the published information. The ‘Wannacry’ malware, which recently affected corporate and individual systems worldwide, uses the aforementioned vulnerabilities and exploit codes that have been published. The hacker group announced that it will publish similar exploit codes and malware on a monthly basis.
Also, as of March 2017, data claimed to belong to foreign intelligence agencies, announced under the name ‘Vault 7’, has been leaked to the internet. This data includes software used to leave backdoors on IT system assets, primarily end-user systems. At the same time, malware that tends to spread through corporate networks using file servers is also included in ‘Vault 7’. It is likely that similar data will continue to be published in 2-3 week intervals.
In order for this leaked data not to affect corporate information security, it is necessary to create an inventory of information systems within the institution and to perform vulnerability detection and impact analysis on this inventory.


Affected Devices


Exploit codes and malware have been developed and spread on the internet that will affect the products listed below by type/brand/model. Therefore, it is important for institutions and organizations to detect these devices in their own information systems inventories (all internal and external networks) and take the necessary actions.


1. Network Devices



  • Juniper Netscreen (NS5XT, NS50, NS200, NS500, ISG 1000, SSG140, SSG5, SSG20, SSG 320M, SSG 350M, SSG 520, SSG 550, SSG 520M, SSG 550M)

  • Cisco PIX (500 Series) Cisco ASA (5505, 5510, 5520, 5540, 5550 series)

  • Cisco Switch/Router (711, 712, 721, 722, 723, 724, 802, 803, 804, 805, 821, 822, 823, 824, 825, 831, 832, 841, 842, 843, 844)

  • Fortinet FortiGate (60, 60M, 80C, 200A, 300A, 400A, 500A, 620B, 800, 3600)

  • WatchGuard, Huawei

  • Solaris 6 – 11


2. Operating System



  • Windows XP

  • Windows Server 2003

  • Windows Vista

  • Windows 7

  • Windows Server 2008

  • Windows 8

  • Windows 8.1

  • Windows Server 2012

  • Windows 10

  • Windows Server 2016


3. File Server



  • Windows File Server


Solution


Institutions and organizations that have the products listed above in their inventories are required to apply the following controls:




  • Access controls



    • Access to management ports of network devices should be restricted on the internal network (access should be allowed only from certain interfaces and IPs) and access from the Internet should be blocked.

    • Access restrictions should be imposed on Windows devices from the Internet, and access to services such as SMB and RDP should be blocked if not necessary.

    • Access from the server network open to the Internet to the internal network should be restricted and domain structures should be kept separate.




  • Software with Update Support



    • It is observed that security patches are being published for products and services affected by published vulnerabilities or exploit codes. Although in exceptional cases, security patches are not published for old version software or operating systems without support. Institutions must use supported software and operating systems in their IT system assets, especially those accessible to the internet or to everyone or other systems on the network.




  • Password management



    • Use of simple and default passwords on servers, end-user devices and network equipment should be avoided.




  • Patch management



    • Security patches on network devices should be tracked and up-to-date firmware versions should be used.

    • Patch management platforms for Windows environments should be reviewed and security patches, especially those for remote code execution vulnerabilities (e.g. MS17-010), should be applied as soon as possible.



  • Antivirus usage

    • Attention should be paid to the use of up-to-date antivirus/antimalware on end-user devices and servers.




Note: Cyber incident detection in the product families mentioned above; the control of possible compromise situations on network devices, servers and end-user computers can be ensured as follows;




  1. The following controls are recommended for detecting possible intrusion situations on network devices:



    • Network device configuration files should be examined and compared with backup files to detect possible anomalies.

    • Log records (self log) on network devices should be examined; possible anomalies in admin/system/root activities should be detected.

    • Processes on network devices and firewalls should be examined.




  2. Doublepulsar; this malware published to open an authorized backdoor on the system in Windows operating system exploit codes can be controlled over the network. A scan can be performed using the “nmap” tool on the SMB and RDP ports of the compromised machine:


    https://nmap.org/nsedoc/scripts/smb-double-pulsar-backdoor.html




  3. The Pandemic malware has been developed to spread to other devices on the internal network using file servers. This malware creates the following registry variable on Windows File Server; this record should be searched on the relevant servers.


    HKLMSYSTEMCurrentControlSetServicesNull -> Null value in the Instances sub-key.



1115 Hit
0 Comments
View Details
Webmaster
1253 Hit
2 Comments

WordPress 4.7.5 Security Update

The 4.7.5 version released by WordPress as a security update is now available for download. Please complete your update immediately for the security of your system.


The security vulnerabilities identified by the WordPress security team in version 4.7.4 are as follows:



  • Cross Site Request Forgery (CSRF) vulnerability in the file system credentials dialog box.

  • Cross-site scripting (XSS) vulnerability when attempting to upload very large files.

  • A cross-site scripting (XSS) vulnerability related to the Customizer.


Source: [https://wordpress.org/news/2017/05/wordpress-4-7-5/]

1253 Hit
0 Comments
View Details