Wordpress zainfekowany? (WP Authenticity Checker)

Wordpress zainfekowany? (WP Authenticity Checker)
SZ
  • Rejestracja:ponad 7 lat
  • Ostatnio:ponad 5 lat
  • Postów:54
0

Przeskanowałem worpressa pluginem WP Authenticity Checker ( WAC ) . I wyskoczyło mi aż tyle lini. Czy to normalnie. Dużo jest pluginów popularnych (yoast w3cache). Proszę o pomoc czy jest to oznaka zainfekowania strony ??. Wynik pokazuje dla:

Kopiuj
Plugin scan results **STATUS: ( Malicious code found in 140 plugin files )**
Themes scan results  =  STATUS: ( Malicious code found in 2 theme files ) 

Plugins scan results

Line 201: "base64_encode( 'api:' . $this->api_key ),..."
 Edit: /tiny-compress-images/src/class-tiny-compress-fopen.php
Line 1737: "base64_encode($encapsulated)) ...."
 Edit: /all-in-one-wp-migration/lib/vendor/math/BigInteger.php
Line 930: "base64 encoded values (Visual Composer)..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 932: "base64_values_callback' ), $input );..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 964: "base64 values (callback)..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 969: "base64_values_callback( $matches ) {..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 970: "base64 characters..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 971: "base64_decode( strip_tags( $matches[1] ) ) );..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 976: "base64 characters..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 977: "base64_encode( rawurlencode( $input ) ) . '[/..."
 Edit: /all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php
Line 56: "base64_encode( "{$user}:{$password}" ) ) ) {..."
 Edit: /all-in-one-wp-migration/lib/model/class-ai1wm-http.php
Line 124: "base64_encode( "{$user}:{$password}" ) ) ) {..."
 Edit: /all-in-one-wp-migration/lib/model/class-ai1wm-http.php
Line 1193: "base64,'.base64_encode($this->menu_svg_color(..."
 Edit: /above-the-fold-optimization/admin/admin.class.php
Line 1261: "base64_encode(hash($algorithm, $script['clien..."
 Edit: /above-the-fold-optimization/includes/optimization.class.php
Line 500: "base64,R0lGOD' ) && ! strpos( $file, 'lazy-lo..."
 Edit: /ewww-image-optimizer/common.php
Line 653: "base64,R0lGOD' ) && ! strpos( $file, 'lazy-lo..."
 Edit: /ewww-image-optimizer/common.php
Line 724: "base64,R0lGOD' ) && $image->getAttribute( 'da..."
 Edit: /ewww-image-optimizer/common.php
Line 759: "base64,R0lGOD' ) || strpos( $file, 'lazy-load..."
 Edit: /ewww-image-optimizer/common.php
Line 2594: "base64,"+a[t]}function ewww_load_images(t){jQ..."
 Edit: /ewww-image-optimizer/common.php
Line 2608: "base64,"+a[t]}function ewww_load_images(t){jQ..."
 Edit: /ewww-image-optimizer/common.php
Line 304: "base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz..."
 Edit: /wp-smushit/extras/dash-notice/wpmudev-dash-notification.php
Line 740: "base64_decode( $response->data->image ); //ba..."
 Edit: /wp-smushit/lib/class-wp-smush.php
Line 384: "base64_encode( pack( 'H*', $md5 ) );..."
 Edit: /w3-total-cache/CdnEngine_Azure.php
Line 220: "base64\r\n";..."
 Edit: /w3-total-cache/lib/Google/Http/MediaFileUpload.php
Line 221: "base64_encode($this->data) . "\r\n";..."
 Edit: /w3-total-cache/lib/Google/Http/MediaFileUpload.php
Line 28: "base64_encode($data);..."
 Edit: /w3-total-cache/lib/Google/Utils.php
Line 44: "base64_decode($b64);..."
 Edit: /w3-total-cache/lib/Google/Utils.php
Line 378: "base64 data urls, we need to handle..."
 Edit: /w3-total-cache/lib/Minify/YUI-CSS-compressor-PHP-port-4.1.0/Minifier.php
Line 395: "base64 encoded URLs...."
 Edit: /w3-total-cache/lib/Minify/YUI-CSS-compressor-PHP-port-4.1.0/Minifier.php
Line 396: "base64,') !== false) {..."
 Edit: /w3-total-cache/lib/Minify/YUI-CSS-compressor-PHP-port-4.1.0/Minifier.php
Line 656: "base64_encode(md5_file($file, true))) : '', '..."
 Edit: /w3-total-cache/lib/S3.php
Line 713: "base64_encode(md5($input, true)),..."
 Edit: /w3-total-cache/lib/S3.php
Line 1276: "base64_encode($data));..."
 Edit: /w3-total-cache/lib/S3.php
Line 1277: "base64_encode($signature));..."
 Edit: /w3-total-cache/lib/S3.php
Line 1350: "base64_encode(str_replace('\/', '/', json_enc..."
 Edit: /w3-total-cache/lib/S3.php
Line 1965: "base64_encode(extension_loaded('hash') ?..."
 Edit: /w3-total-cache/lib/S3.php
Line 133: "base64_encode(hash_hmac('sha1', $base_string,..."
 Edit: /w3-total-cache/lib/OAuth/W3tcOAuth.php
Line 213: "base64_encode($signature);..."
 Edit: /w3-total-cache/lib/OAuth/W3tcOAuth.php
Line 217: "base64_decode($signature);..."
 Edit: /w3-total-cache/lib/OAuth/W3tcOAuth.php
Line 346: "base64_encode("$value[0]:$value[1]");..."
 Edit: /w3-total-cache/lib/Azure/GuzzleHttp/Client.php
Line 1606: "base64_encode(..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Blob/BlobRestProxy.php
Line 53: "base64 representation...."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/StorageServiceSettings.php
Line 115: "base64 string...."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/StorageServiceSettings.php
Line 181: "base64_decode will return false if the $key i..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/StorageServiceSettings.php
Line 183: "Base64String = base64_decode($key, true);..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/StorageServiceSettings.php
Line 184: "Base64String) {..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/StorageServiceSettings.php
Line 135: "base64_encode(..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Authentication/SharedKeyAuthScheme.php
Line 136: "base64_decode($this->accountKey), true)..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Authentication/SharedKeyAuthScheme.php
Line 117: "base64_encode(..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Authentication/TableSharedKeyLiteAuthScheme.php
Line 118: "base64_decode($this->accountKey), true)..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Authentication/TableSharedKeyLiteAuthScheme.php
Line 95: "base64 string. It has to pass the check 'base..."
 Edit: /w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Resources.php
Line 188: "base64Binary'=>'string',..."
 Edit: /w3-total-cache/lib/Nusoap/class.nusoap_base.php
Line 199: "base64Binary'=>'string','base64'=>'string','u..."
 Edit: /w3-total-cache/lib/Nusoap/class.nusoap_base.php
Line 203: "base64Binary'=>'string','base64'=>'string','u..."
 Edit: /w3-total-cache/lib/Nusoap/class.nusoap_base.php
Line 205: "base64'=>'string','array'=>'array','Array'=>'..."
 Edit: /w3-total-cache/lib/Nusoap/class.nusoap_base.php
Line 474: "base64_encode(str_replace(':','',$username).'..."
 Edit: /w3-total-cache/lib/Nusoap/class.soap_transport_http.php
Line 585: "base64_encode($proxyusername.':'.$proxypasswo..."
 Edit: /w3-total-cache/lib/Nusoap/class.soap_transport_http.php
Line 188: "base64Binary'=>'string',..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 199: "base64Binary'=>'string','base64'=>'string','u..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 203: "base64Binary'=>'string','base64'=>'string','u..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 205: "base64'=>'string','array'=>'array','Array'=>'..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 2627: "base64_encode(str_replace(':','',$username).'..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 2738: "base64_encode($proxyusername.':'.$proxypasswo..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 6949: "base64' || $type == 'base64Binary') {..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 6950: "base64 value');..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 6951: "base64_decode($value);..."
 Edit: /w3-total-cache/lib/Nusoap/nusoap.php
Line 502: "base64' || $type == 'base64Binary') {..."
 Edit: /w3-total-cache/lib/Nusoap/class.soap_parser.php
Line 503: "base64 value');..."
 Edit: /w3-total-cache/lib/Nusoap/class.soap_parser.php
Line 504: "base64_decode($value);..."
 Edit: /w3-total-cache/lib/Nusoap/class.soap_parser.php
Line 1021: "base64_encode(hash_hmac('sha256', $string_to_..."
 Edit: /w3-total-cache/lib/SNS/sdk.class.php
Line 1072: "base64(md5($querystring));..."
 Edit: /w3-total-cache/lib/SNS/sdk.class.php
Line 1135: "base64_encode(hash_hmac('sha256', $bytes_to_s..."
 Edit: /w3-total-cache/lib/SNS/sdk.class.php
Line 1140: "base64_encode(hash_hmac('sha256', $string_to_..."
 Edit: /w3-total-cache/lib/SNS/sdk.class.php
Line 66: "base64_decode($message->get('Signature'));..."
 Edit: /w3-total-cache/lib/SNS/services/MessageValidator/MessageValidator.php
Line 86: "Base64...."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 89: "Base64-encoded string...."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 91: "base64($str)..."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 100: "base64_encode($raw);..."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 328: "Base64 encoded or not...."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 330: "base64-decode.php#81425 PHP License..."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 332: "Base64 encoded or not...."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 334: "base64($s)..."
 Edit: /w3-total-cache/lib/SNS/utilities/utilities.class.php
Line 803: "base64_encode(json_encode($list))...."
 Edit: /wp-asset-clean-up/classes/Main.php
Line 875: "base64_decode($wpacuList);..."
 Edit: /wp-asset-clean-up/classes/Main.php
Line 883: "base64_decode($contents);..."
 Edit: /wp-asset-clean-up/classes/Main.php
Line 26: "base64_encode($data);..."
 Edit: /wordpress-seo/vendor/yoast/api-libs/google/service/Google_Utils.php
Line 37: "base64_decode($b64);..."
 Edit: /wordpress-seo/vendor/yoast/api-libs/google/service/Google_Utils.php
Line 134: "base64\r\n";..."
 Edit: /wordpress-seo/vendor/yoast/api-libs/google/service/Google_MediaFileUpload.php
Line 135: "base64_encode($data) . "\r\n";..."
 Edit: /wordpress-seo/vendor/yoast/api-libs/google/service/Google_MediaFileUpload.php
Line 268: "base64 (numeric + alpha + alpha upper case) w..."
 Edit: /wordpress-seo/inc/sitemaps/class-sitemaps-cache-validator.php
Line 917: "base64 URL for the svg for use in the menu...."
 Edit: /wordpress-seo/inc/class-wpseo-utils.php
Line 921: "base64 Whether or not to return base64'd outp..."
 Edit: /wordpress-seo/inc/class-wpseo-utils.php
Line 925: "base64 = true ) {..."
 Edit: /wordpress-seo/inc/class-wpseo-utils.php
Line 928: "base64 ) {..."
 Edit: /wordpress-seo/inc/class-wpseo-utils.php
Line 929: "base64,' . base64_encode( $svg );..."
 Edit: /wordpress-seo/inc/class-wpseo-utils.php
Line 2593: "base64_decode( $_GET[ 'uri' ] ) ) );..."
 Edit: /wp-super-cache/wp-cache.php
Line 2599: "base64_decode( $_GET[ 'uri' ] ) ) ) );..."
 Edit: /wp-super-cache/wp-cache.php
Line 2710: "base64_encode( $directory ) ) ), 'wp-cache' )..."
 Edit: /wp-super-cache/wp-cache.php
Line 90: "base64 and date..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 94: "Base64')) {..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 95: "base64';..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 150: "base64':..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 312: "base64':..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 313: "base64_decode($this->_currentTagContents);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 883: "Base64..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 888: "Base64..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 897: "Base64($data)..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 904: "base64>'.base64_encode($this->data).'</base64..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 998: "base64':..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 1056: "base64':..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 1057: "Base64('base64');..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php
Line 187: "base64_encode($username) . $this->CRLF);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer-smtp.php
Line 205: "base64_encode($password) . $this->CRLF);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer-smtp.php
Line 62: "base64", and "quoted-printable"...."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1126: "base64', $type = 'application/octet-stream')..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1214: "base64') {..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1247: "base64') {..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1250: "base64':..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1252: "base64_encode($str), 76, $this->LE);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1314: "Base64EncodeWrapMB($str);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1316: "base64_encode($str);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1355: "Base64EncodeWrapMB($str) {..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1365: "Base64 has a 4:3 ratio..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1374: "base64_encode($chunk);..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1484: "base64', $type = 'application/octet-stream')..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1510: "base64', $type = 'application/octet-stream')..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1754: "base64',$mimeType) ) {..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.mailer.php
Line 1506: "base64_encode( $this->authentication() );..."
 Edit: /buddypress/bp-forums/bbpress/bb-includes/backpress/class.wp-http.php
Line 1102: "Base64 encoded image...."
 Edit: /buddypress/bp-core/bp-core-avatars.php
Line 1119: "Base64 encoded image...."
 Edit: /buddypress/bp-core/bp-core-avatars.php
Line 1268: "base64,', ' ' ), array( '', '+' ), $avatar_da..."
 Edit: /buddypress/bp-core/bp-core-avatars.php
Line 1269: "base64_decode( $webcam_avatar );..."
 Edit: /buddypress/bp-core/bp-core-avatars.php
Line 523: "base64_encode( wp_generate_password( 64, true..."
 Edit: /buddypress/bp-core/admin/bp-core-admin-schema.php
Line 518: "base64_encode( wp_generate_password( 64, true..."
 Edit: /buddypress/bp-core/bp-core-update.php
Line 156: "base64_decode( stripslashes( $_COOKIE['bp_com..."
 Edit: /buddypress/bp-groups/bp-groups-actions.php
Line 275: "base64_encode( json_encode( $bp->groups->comp..."
 Edit: /buddypress/bp-groups/bp-groups-actions.php
Line 37: "base64 Encoding..."
 Edit: /tac/tac.php
Line 38: "base64 functions...."
 Edit: /tac/tac.php
Line 48: "base64")) // Check for any base64 functions..."
 Edit: /tac/tac.php
Line 54: "base64"), 0, 45))) . "...\"</div>";..."
 Edit: /tac/tac.php
edytowany 1x, ostatnio: flowCRANE
czysteskarpety
czysteskarpety
  • Rejestracja:prawie 10 lat
  • Ostatnio:ponad 4 lata
  • Lokalizacja:Piwnica
  • Postów:7697
0

niekoniecznie, przeleć jakimś skanerem online https://sitecheck.sucuri.net/ i zoba co pokaże


SZ
  • Rejestracja:ponad 7 lat
  • Ostatnio:ponad 5 lat
  • Postów:54
0

Z kolei druga wtyczke Expoit Skaner wykazuje 666 bledów
(Results Level Severe (666 matches) ) a w tym jest cos takiego: ** ( a prócz tego pod wszystki jest jeszcze sekcja Level Warning (1115 matches) ) ...** i kolejne błedy ...
aha strona praktycznie swieza z pluginami do optymalizacji itp..

Kopiuj
wp-admin/includes/class-pclzip.php:4068
Often used to execute malicious code	// eval('$v_result = '.$p_options[PCLZIP_CB_PRE_EXTRACT
wp-admin/includes/file.php:1013
Used by malicious scripts to decode previously obscured data/programs	$expected_raw_md5 = base64_decode( $expected_md5 );
wp-includes/js/tw-sack.min.js:1
Often used to execute malicious code	is.argumentSeparator)},this.runResponse=function(){eval(this.response)},this.runAJAX=function(a){if(thi
wp-includes/js/tw-sack.js:119
Often used to execute malicious code	eval(this.response);
wp-includes/js/jquery/jquery.form.min.js:11
Often used to execute malicious code	e?b:null},I=a.parseJSON||function(a){return window.eval("("+a+")")},J=function(b,c,d){var e=b.getRespon
wp-includes/js/jquery/jquery.schedule.js:30
Often used to execute malicious code	ctx["func"]=eval("function () { "+ctx["func"]+" }");}
wp-includes/js/tinymce/tiny_mce_popup.js:192
Often used to execute malicious code	eval(evil);
wp-includes/js/json2.js:504
Often used to execute malicious code	j = eval('(' + text + ')');
wp-includes/js/json2.min.js:1
Often used to execute malicious code	eplace(rx_three,"]").replace(rx_four,"")))return j=eval("("+text+")"),"function"==typeof reviver?walk({
wp-includes/js/plupload/moxie.js:3278
Used by malicious scripts to decode previously obscured data/programs	// * example 1: base64_decode('S2V2aW4gdmFuIFpvbm5ldmVsZA==');
wp-includes/ID3/module.audio.ogg.php:679
Used by malicious scripts to decode previously obscured data/programs	$flac->setStringMode(base64_decode($ThisFileInfo_ogg_comments_raw[$i]['value']));
wp-includes/ID3/module.audio.ogg.php:686
Used by malicious scripts to decode previously obscured data/programs	$data = base64_decode($ThisFileInfo_ogg_comments_raw[$i]['value']);
wp-includes/random_compat/random_bytes_com_dotnet.php:66
Used by malicious scripts to decode previously obscured data/programs	$buf .= base64_decode($util->GetRandom($bytes, 0));
wp-includes/SimplePie/Sanitize.php:244
Used by malicious scripts to decode previously obscured data/programs	$data = base64_decode($data);
wp-includes/class-wp-simplepie-sanitize-kses.php:46
Used by malicious scripts to decode previously obscured data/programs	$data = base64_decode( $data );
wp-includes/class-wp-customize-widgets.php:1289
Used by malicious scripts to decode previously obscured data/programs	$decoded = base64_decode( $value['encoded_serialized_instance'], true );
wp-includes/IXR/class-IXR-message.php:196
Used by malicious scripts to decode previously obscured data/programs	$value = base64_decode($this->_currentTagContents);
wp-includes/class-snoopy.php:678
Often used to execute malicious code	// I didn't use preg eval (//e) since that is only available in PHP 4.0.
wp-includes/class-phpmailer.php:3411
Used by malicious scripts to decode previously obscured data/programs	$data = base64_decode($data);
wp-includes/class-json.php:22
Often used to execute malicious code	* Javascript, and can be directly eval()'ed with no further parsing
wp-includes/class-smtp.php:471
Used by malicious scripts to decode previously obscured data/programs	$challenge = base64_decode(substr($this->last_reply, 4));
wp-content/cache/object/ac6/a9c/ac6a9c2d3b3c1fd69b69f842874407dc.php:1
Often used to execute malicious code	.php";s:4:"line";s:78:"// eval(#$#$'$v_result = '.$p_options[PCLZIP_CB_PRE_EXTRACT";s:7:"line_no";i:4068 [line truncated]
wp-content/cache/object/ac6/a9c/ac6a9c2d3b3c1fd69b69f842874407dc.php:1
Used by malicious scripts to decode previously obscured data/programs	.php";s:4:"line";s:78:"// eval('$v_result = '.$p_options[PCLZIP_CB_PRE_EXTRACT";s:7:"line_no";i:4068;s:4:"de [line truncated]
wp-content/themes/boombox/includes/plugins/essb.php:179
Used by malicious scripts to decode previously obscured data/programs	$options = json_decode( base64_decode( $default_options ), true );
wp-content/plugins/all-in-one-wp-migration/lib/vendor/servmask/database/class-ai1wm-database.php:971
Used by malicious scripts to decode previously obscured data/programs	$input = rawurldecode( base64_decode( strip_tags( $matches[1] ) ) );
wp-content/plugins/above-the-fold-optimization/public/js/critical-css-editor.min.js:1
Often used to execute malicious code	']*["']/.test(text)?(this.type="string",this.value=eval(text)):Colors[text.toLowerCase()]?(this.type="c
wp-content/plugins/above-the-fold-optimization/admin/js/csslint.js:4346
Often used to execute malicious code	this.value = eval(text);
wp-content/plugins/above-the-fold-optimization/admin/js/codemirror.min.js:1
Often used to execute malicious code	']*["']/.test(text)?(this.type="string",this.value=eval(text)):Colors[text.toLowerCase()]?(this.type="c
wp-content/plugins/wp-smushit/lib/class-wp-smush.php:740
Used by malicious scripts to decode previously obscured data/programs	$image = base64_decode( $response->data->image ); //base64_decode is n
wp-content/plugins/w3-total-cache/pub/js/metadata.js:91
Often used to execute malicious code	data = eval("(" + data + ")");
wp-content/plugins/w3-total-cache/lib/Google/Utils.php:44
Used by malicious scripts to decode previously obscured data/programs	return base64_decode($b64);
wp-content/plugins/w3-total-cache/lib/OAuth/W3tcOAuth.php:217
Used by malicious scripts to decode previously obscured data/programs	$decoded_sig = base64_decode($signature);
wp-content/plugins/w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/StorageServiceSettings.php:183
Used by malicious scripts to decode previously obscured data/programs	$isValidBase64String = base64_decode($key, true);
wp-content/plugins/w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Authentication/SharedKeyAuthScheme.php:136
Used by malicious scripts to decode previously obscured data/programs	hash_hmac('sha256', $signature, base64_decode($this->accountKey), true)
wp-content/plugins/w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Authentication/TableSharedKeyLiteAuthScheme.php:118
Used by malicious scripts to decode previously obscured data/programs	hash_hmac('sha256', $signature, base64_decode($this->accountKey), true)
wp-content/plugins/w3-total-cache/lib/Azure/MicrosoftAzureStorage/Common/Internal/Resources.php:95
Used by malicious scripts to decode previously obscured data/programs	a valid base64 string. It has to pass the check 'base64_decode(<user_account_key>, true)'.";
wp-content/plugins/w3-total-cache/lib/Nusoap/class.soapclient.php:711
Often used to execute malicious code	eval($evalStr);
wp-content/plugins/w3-total-cache/lib/Nusoap/class.soapclient.php:713
Often used to execute malicious code	eval("\$proxy = new nusoap_proxy_$r('');");
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:3993
Often used to execute malicious code	s->debug('in invoke_method, calling function using eval()');
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:3997
Often used to execute malicious code	ebug('in invoke_method, calling class method using eval()');
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:4000
Often used to execute malicious code	g('in invoke_method, calling instance method using eval()');
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:4019
Often used to execute malicious code	@eval($funcCall);
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:6951
Used by malicious scripts to decode previously obscured data/programs	return base64_decode($value);
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:7798
Often used to execute malicious code	eval($evalStr);
wp-content/plugins/w3-total-cache/lib/Nusoap/nusoap.php:7800
Often used to execute malicious code	eval("\$proxy = new nusoap_proxy_$r('');");
wp-content/plugins/w3-total-cache/lib/Nusoap/class.soap_parser.php:504
Used by malicious scripts to decode previously obscured data/programs	return base64_decode($value);
wp-content/plugins/w3-total-cache/lib/SNS/services/MessageValidator/MessageValidator.php:66
Used by malicious scripts to decode previously obscured data/programs	$incomingSignature = base64_decode($message->get('Signature'));
wp-content/plugins/w3-total-cache/PgCache_ContentGrabber.php:1664
Often used to execute malicious code	$result = eval( $code );
wp-content/plugins/wp-asset-clean-up/classes/Main.php:875
Used by malicious scripts to decode previously obscured data/programs	$json = base64_decode($wpacuList);
wp-content/plugins/wp-asset-clean-up/classes/Main.php:883
Used by malicious scripts to decode previously obscured data/programs	$data['contents'] = base64_decode($contents);
wp-content/plugins/wordpress-seo/js/dist/jquery.tablesorter.min.js:3
Often used to execute malicious code	mark("Evaling expression:"+dynamicExp,new Date());}eval(dynamicExp);cache.normalized.sort(sortWrapper);
wp-content/plugins/wordpress-seo/vendor/yoast/api-libs/google/service/Google_Utils.php:37
Used by malicious scripts to decode previously obscured data/programs	return base64_decode($b64);
wp-content/plugins/wp-super-cache/wp-cache.php:2593
Used by malicious scripts to decode previously obscured data/programs	hp' ), preg_replace( '/[ <>\'\"\r\n\t\(\)]/', '', base64_decode( $_GET[ 'uri' ] ) ) );
wp-content/plugins/wp-super-cache/wp-cache.php:2599
Used by malicious scripts to decode previously obscured data/programs	\r\n\t\(\)]/', '', preg_replace("/(\?.*)?$/", '', base64_decode( $_GET[ 'uri' ] ) ) ) );
wp-content/plugins/exploit-scanner/readme.txt:114
Often used to execute malicious code	* Fixed the eval() check incorrectly matching function names tha
wp-content/plugins/buddypress/bp-forums/bbpress/bb-includes/js/jquery/interface.js:12
Often used to execute malicious code	eval(function(p,a,c,k,e,d){e=function(c){return(c<a?
wp-content/plugins/buddypress/bp-forums/bbpress/bb-includes/backpress/class.ixr.php:313
Used by malicious scripts to decode previously obscured data/programs	$value = base64_decode($this->_currentTagContents);
wp-content/plugins/buddypress/bp-core/bp-core-avatars.php:1269
Used by malicious scripts to decode previously obscured data/programs	$webcam_avatar = base64_decode( $webcam_avatar );
wp-content/plugins/buddypress/bp-groups/bp-groups-actions.php:156
Used by malicious scripts to decode previously obscured data/programs	bp->groups->completed_create_steps = json_decode( base64_decode( stripslashes( $_COOKIE['bp_completed_create_st
edytowany 1x, ostatnio: flowCRANE
SZ
  • Rejestracja:ponad 7 lat
  • Ostatnio:ponad 5 lat
  • Postów:54
0

w szczegolnosci to mnie zastanawia:

Kopiuj
this.read=function(t){for(var e="",i=0;i<t;i++)e+=String.fromCharCode(this.readByte());return e},this.readUnsigned=function(){var t=this.readBy [line truncated]
this.read=function(t){for(var e="",i=0;i<t;i++)e+=String.fromCharCode(this.readByte());return e},this.readUnsigned=function(){var t=this.readBy [line truncated]
tpl : '<iframe id="fancybox-frame{rnd}" name="fancybox-frame{
s += String.fromCharCode(this.readByte());
switch (String.fromCharCode(block.sentinel)) { // For ease of matching
se = new VBArray(this.responseText).toArray().map(String.fromCharCode).join('');
testDrive.innerHTML = testText.value || String.fromCharCode(160);
testDrive.innerHTML = testText.value || String.fromCharCode(160);
$html = sprintf( '<iframe %s></iframe>', implode( ' ', $iframe_atts ) );
if( _value.indexOf( '<iframe' ) != '-1' ) {
if ( strpos( $value, '<iframe' ) !== false ) {
edytowany 1x, ostatnio: flowCRANE
0

Podepnę się pod temat. Mam powtarzający się problem z malware. Jak się tego pozbyć i zabezpieczyć żeby się nie pojawiało ponownie?
Mój dostawca serwera przeskanował serwer i wysłał listę podejrzanych plików.
Postawiłem strony na nowo i w ciągu 24 godzin problem znowu się pojawił.

0
Krystian_4775 napisał(a):

Podepnę się pod temat. Mam powtarzający się problem z malware. Jak się tego pozbyć i zabezpieczyć żeby się nie pojawiało ponownie?
Mój dostawca serwera przeskanował serwer i wysłał listę podejrzanych plików.
Postawiłem strony na nowo i w ciągu 24 godzin problem znowu się pojawił.
Podpinam raz jeszcze plik bo tamten coś nie działa.

czysteskarpety
czysteskarpety
  • Rejestracja:prawie 10 lat
  • Ostatnio:ponad 4 lata
  • Lokalizacja:Piwnica
  • Postów:7697
2

zmienić konto hostingowe i zamienić wordpressa na html/css


Kliknij, aby dodać treść...

Pomoc 1.18.8

Typografia

Edytor obsługuje składnie Markdown, w której pojedynczy akcent *kursywa* oraz _kursywa_ to pochylenie. Z kolei podwójny akcent **pogrubienie** oraz __pogrubienie__ to pogrubienie. Dodanie znaczników ~~strike~~ to przekreślenie.

Możesz dodać formatowanie komendami , , oraz .

Ponieważ dekoracja podkreślenia jest przeznaczona na linki, markdown nie zawiera specjalnej składni dla podkreślenia. Dlatego by dodać podkreślenie, użyj <u>underline</u>.

Komendy formatujące reagują na skróty klawiszowe: Ctrl+B, Ctrl+I, Ctrl+U oraz Ctrl+S.

Linki

By dodać link w edytorze użyj komendy lub użyj składni [title](link). URL umieszczony w linku lub nawet URL umieszczony bezpośrednio w tekście będzie aktywny i klikalny.

Jeżeli chcesz, możesz samodzielnie dodać link: <a href="link">title</a>.

Wewnętrzne odnośniki

Możesz umieścić odnośnik do wewnętrznej podstrony, używając następującej składni: [[Delphi/Kompendium]] lub [[Delphi/Kompendium|kliknij, aby przejść do kompendium]]. Odnośniki mogą prowadzić do Forum 4programmers.net lub np. do Kompendium.

Wspomnienia użytkowników

By wspomnieć użytkownika forum, wpisz w formularzu znak @. Zobaczysz okienko samouzupełniające nazwy użytkowników. Samouzupełnienie dobierze odpowiedni format wspomnienia, zależnie od tego czy w nazwie użytkownika znajduje się spacja.

Znaczniki HTML

Dozwolone jest używanie niektórych znaczników HTML: <a>, <b>, <i>, <kbd>, <del>, <strong>, <dfn>, <pre>, <blockquote>, <hr/>, <sub>, <sup> oraz <img/>.

Skróty klawiszowe

Dodaj kombinację klawiszy komendą notacji klawiszy lub skrótem klawiszowym Alt+K.

Reprezentuj kombinacje klawiszowe używając taga <kbd>. Oddziel od siebie klawisze znakiem plus, np <kbd>Alt+Tab</kbd>.

Indeks górny oraz dolny

Przykład: wpisując H<sub>2</sub>O i m<sup>2</sup> otrzymasz: H2O i m2.

Składnia Tex

By precyzyjnie wyrazić działanie matematyczne, użyj składni Tex.

<tex>arcctg(x) = argtan(\frac{1}{x}) = arcsin(\frac{1}{\sqrt{1+x^2}})</tex>

Kod źródłowy

Krótkie fragmenty kodu

Wszelkie jednolinijkowe instrukcje języka programowania powinny być zawarte pomiędzy obróconymi apostrofami: `kod instrukcji` lub ``console.log(`string`);``.

Kod wielolinijkowy

Dodaj fragment kodu komendą . Fragmenty kodu zajmujące całą lub więcej linijek powinny być umieszczone w wielolinijkowym fragmencie kodu. Znaczniki ``` lub ~~~ umożliwiają kolorowanie różnych języków programowania. Możemy nadać nazwę języka programowania używając auto-uzupełnienia, kod został pokolorowany używając konkretnych ustawień kolorowania składni:

```javascript
document.write('Hello World');
```

Możesz zaznaczyć również już wklejony kod w edytorze, i użyć komendy  by zamienić go w kod. Użyj kombinacji Ctrl+`, by dodać fragment kodu bez oznaczników języka.

Tabelki

Dodaj przykładową tabelkę używając komendy . Przykładowa tabelka składa się z dwóch kolumn, nagłówka i jednego wiersza.

Wygeneruj tabelkę na podstawie szablonu. Oddziel komórki separatorem ; lub |, a następnie zaznacz szablonu.

nazwisko;dziedzina;odkrycie
Pitagoras;mathematics;Pythagorean Theorem
Albert Einstein;physics;General Relativity
Marie Curie, Pierre Curie;chemistry;Radium, Polonium

Użyj komendy by zamienić zaznaczony szablon na tabelkę Markdown.

Lista uporządkowana i nieuporządkowana

Możliwe jest tworzenie listy numerowanych oraz wypunktowanych. Wystarczy, że pierwszym znakiem linii będzie * lub - dla listy nieuporządkowanej oraz 1. dla listy uporządkowanej.

Użyj komendy by dodać listę uporządkowaną.

1. Lista numerowana
2. Lista numerowana

Użyj komendy by dodać listę nieuporządkowaną.

* Lista wypunktowana
* Lista wypunktowana
** Lista wypunktowana (drugi poziom)

Składnia Markdown

Edytor obsługuje składnię Markdown, która składa się ze znaków specjalnych. Dostępne komendy, jak formatowanie , dodanie tabelki lub fragmentu kodu są w pewnym sensie świadome otaczającej jej składni, i postarają się unikać uszkodzenia jej.

Dla przykładu, używając tylko dostępnych komend, nie możemy dodać formatowania pogrubienia do kodu wielolinijkowego, albo dodać listy do tabelki - mogłoby to doprowadzić do uszkodzenia składni.

W pewnych odosobnionych przypadkach brak nowej linii przed elementami markdown również mógłby uszkodzić składnie, dlatego edytor dodaje brakujące nowe linie. Dla przykładu, dodanie formatowania pochylenia zaraz po tabelce, mogłoby zostać błędne zinterpretowane, więc edytor doda oddzielającą nową linię pomiędzy tabelką, a pochyleniem.

Skróty klawiszowe

Skróty formatujące, kiedy w edytorze znajduje się pojedynczy kursor, wstawiają sformatowany tekst przykładowy. Jeśli w edytorze znajduje się zaznaczenie (słowo, linijka, paragraf), wtedy zaznaczenie zostaje sformatowane.

  • Ctrl+B - dodaj pogrubienie lub pogrub zaznaczenie
  • Ctrl+I - dodaj pochylenie lub pochyl zaznaczenie
  • Ctrl+U - dodaj podkreślenie lub podkreśl zaznaczenie
  • Ctrl+S - dodaj przekreślenie lub przekreśl zaznaczenie

Notacja Klawiszy

  • Alt+K - dodaj notację klawiszy

Fragment kodu bez oznacznika

  • Alt+C - dodaj pusty fragment kodu

Skróty operujące na kodzie i linijkach:

  • Alt+L - zaznaczenie całej linii
  • Alt+, Alt+ - przeniesienie linijki w której znajduje się kursor w górę/dół.
  • Tab/⌘+] - dodaj wcięcie (wcięcie w prawo)
  • Shit+Tab/⌘+[ - usunięcie wcięcia (wycięcie w lewo)

Dodawanie postów:

  • Ctrl+Enter - dodaj post
  • ⌘+Enter - dodaj post (MacOS)