You may have heard about a vulnerability in Bash, a command processor that allows a user to conduct actions through a command-line interface for Linux environments. The vulnerability, called Shellshock, has a bug that does not allow privileged escalation. But if exploited, a threat actor with access to a Linux server can run arbitrary commands. …
Highlights Manage your media and embedded content with style Explore your uploads in a beautiful, endless grid A new details preview makes viewing and editing any amount of media in sequence a snap. The content-editing experience is better than ever The visual editor now expands to fit your content A fixed toolbar in the editor …