Showing:

All Functions



fwrite

wp-admin/includes/upgrade.php : 2740

2736:  			elseif (strpos($line, 'Theme URI:') !== false) $line = 'Theme URI: ' . __get_option('url');
2737: elseif (strpos($line, 'Description:') !== false) $line = 'Description: Your theme.';
2738: elseif (strpos($line, 'Version:') !== false) $line = 'Version: 1';
2739: elseif (strpos($line, 'Author:') !== false) $line = 'Author: You';
2740: fwrite($f, $line . "\n");
2741: }
2742: fclose($f);
2743: }
2744:
Submitted: Jan 9, 2019 · Updated: Jan 9, 2019 · Moderated: Jan 9, 2019
This script was compared against the WordPress core and a match was found. This is deemed not harmful. FileChecker - Wednesday, January 9, 2019
Was this helpful? Yes | No

fwrite

wp-admin/includes/upgrade.php : 2692

2688:  	if ($stylelines) {
2689: $f = fopen("$site_dir/style.css", 'w');
2690:
2691: fwrite($f, $header);
2692: fwrite($f, $stylelines);
2693: fclose($f);
2694: }
2695:
2696: return true;
Submitted: Jan 9, 2019 · Updated: Jan 9, 2019 · Moderated: Jan 9, 2019
This script was compared against the WordPress core and a match was found. This is deemed not harmful. FileChecker - Wednesday, January 9, 2019
Was this helpful? Yes | No

fwrite

wp-admin/includes/upgrade.php : 2691

2687:  	$stylelines = file_get_contents("$site_dir/style.css");
2688: if ($stylelines) {
2689: $f = fopen("$site_dir/style.css", 'w');
2690:
2691: fwrite($f, $header);
2692: fwrite($f, $stylelines);
2693: fclose($f);
2694: }
2695:
Submitted: Jan 9, 2019 · Updated: Jan 9, 2019 · Moderated: Jan 9, 2019
This script was compared against the WordPress core and a match was found. This is deemed not harmful. FileChecker - Wednesday, January 9, 2019
Was this helpful? Yes | No

fwrite

wp-admin/includes/upgrade.php : 2678

2674:  
2675: // Update comments template inclusion.
2676: $line = str_replace("<?php include(ABSPATH . 'wp-comments.php'); ?>", "<?php comments_template(); ?>", $line);
2677:
2678: fwrite($f, "{$line}\n");
2679: }
2680: fclose($f);
2681: }
2682: }
Submitted: Jan 9, 2019 · Updated: Jan 9, 2019 · Moderated: Jan 9, 2019
This script was compared against the WordPress core and a match was found. This is deemed not harmful. FileChecker - Wednesday, January 9, 2019
Was this helpful? Yes | No

fwrite

wp-includes/rest-api/endpoints/class-wp-rest-attachments-controller.php : 572

568:  		if ( ! $fp ) {
569: return new WP_Error( 'rest_upload_file_error', __( 'Could not open file handle.' ), array( 'status' => 500 ) );
570: }
571:
572: fwrite( $fp, $data );
573: fclose( $fp );
574:
575: // Now, sideload it in.
576: $file_data = array(
Submitted: Jan 9, 2019 · Updated: Jan 9, 2019 · Moderated: Jan 9, 2019
This script was compared against the WordPress core and a match was found. This is deemed not harmful. If, however, you do not intend to use the WordPress rest-API, it is recommended you disable it due to other known vulnerabilities. FileChecker - Wednesday, January 9, 2019
Was this helpful? Yes | No