![]() It is always a good idea to backup your WordPress before proceeding with the update, if there are any issues, you can restore your website. Updates are simple Dashboard > Updates > Update Now. WordPress 5.3.1 contains 46 maintenance fixes. Users: ensure administration email verification uses the user’s locale instead of the site locale.Uploads: avoid thumbnails overwriting other uploads when filename matches, and exclude PNG images from scaling after upload. ![]() Site health: allow the remind interval for the admin email verification to be filtered.By far the most common type of hacked block is what we are now referring to as 'argument hacking'. External libraries: update sodium_compat. While hacked blocks are uncommon (used by less than 0.01 of shared projects), they are used by some high-profile projects and are interesting to some Scratchers.Embeds: remove CollegeHumor oEmbed provider as the service doesn’t exist anymore.Block Strike free 5.3.1 filesize: 61.91 MB version: 5.3.1 Download Block. Date/time: improve non-GMT dates calculation, fix date format output in specific languages and make get_() more resilient against PHP timezone changes. Information Of Block Strike MOD features: Requirement Android 4.0.3+ Rating 7.7.Bundled themes: add customizer option to show/hide author bio, replace JS based smooth scroll with CSS (see related dev note) and fix Instagram embed CSS.Block editor: fix Edge scrolling issues and intermittent JavaScript issues.Administration: improvements to admin form controls height and alignment standardization (see related dev note), dashboard widget links accessibility and alternate color scheme readability issues (see related dev note).There are several maintenance updates are released including the following: The next major release will be version 5.4. WordPress announced that the WordPress 5.3.1 is a short-cycle maintenance release. There are two Cross-site scripts (XSS) vulnerabilities are fixed in this release, one could be stored in well-crafted links and the other one, a stored XSS vulnerability using block editor content.The second one is Props to the Security Team for hardening wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute. ![]()
0 Comments
Leave a Reply. |