Archive For: June, 2014

XenForo 1.3.3 Released

XenForo upgrade

XenForo upgrade

Today, we are happy to release XenForo 1.3.3. This release fixes a number of bugs and issues that were found in 1.3.2. As this is a maintenance release, the vast majority of the focus was an increase in stability.

Some of the bug fixes include:

Fix Google+ integration in IE8
Attempt to prevent appearance of duplicate posts when refreshing the page in Firefox
Improve the speed of BB code stripping on large posts
Fix link canonicalization of “//” links

Disable the rich text editor in Firefox on Android due to incompatibilities
Fix some editor inconsistencies in IE11
Maintain formatting when pasting between editors in more cases
When editing a link in the editor, update the link text if it’s the same as the link
Ensure that links in emails that are set to blend in have underlines
See or contact for more information

Read More

vBulletin5 gets Spanish Language Support

Just released a Spanish language pack for vBulletin 5.1.1. German and French language packshave gotten excellent feedback and expanding language support to Spanish is a great addition.

The vBulletin 5.1.1 language packs for all three languages are now available in the vBulletin Members Area. If you would like to install one of these and have any questions on them, you can post in either the vBulletin 5 Support Issues & Questions or the language-specific sections of our forum, or contact

Read More

Update Patches Vulnerability in the All in One SEO Pack WordPress Plugin


A security release patching two privilege escalation vulnerabilities found earlier this week has been released
Two security flaws permit an attacker to escalate privileges and leave the site open for cross site scripting attacks. If you allow subscribers, authors and non-admin users logging in to wp-admin, you are a risk. If you have open registration, your site is at risk and you should update asap.

In privilege escalation, a logged-in user, without any sort of admin privileges (like an author of subscriber), can add or modify certain parameters used by the plugin. This includes SEO title, description and keyword meta tags.
In conjunction with another vulnerability this bug can also execute malicious Javascript code. Opening the site to potential javascript code injections and the opportunity to change the admin password or leaving a backdoor in your website’s files in order for later nefarious.
The fix is easy: Upgrade to the latest’s version

Read More