getting casino links on my woocommerce site [closed]

Your site is almost definitely compromised. Doing your own cleanup may not be worth the time and effort because reinfection is likely if you miss a single infected file. At this point I recommend to my clients that they get professional help. You may be able to get more details from a site scan by … Read more

Find and Replace text in the entire table using a MySQL query

Do you have SSH access? WP-CLI via search-replace. $ wp search-replace ‘<script>bad javascript code</script>’ ” –precise By default, this only searches for tables registered in $wpdb. To overwrite this behaviour, you can use either the –all-tables or –all-tables-with-prefix flag. (Or pass table names to the command manually.) Alternative: Easiest would be to download a dump, … Read more

Increased CPU load due to admin-ajax.php spam

No there isn’t a way, any more than there is a way to block “spammers” from accessing you home page. I mean you could put all kind of checks, but in the end you will break how sites are supposed to behave which will mean that someone somewhere will not get his content. If all … Read more

Invisible spam post in backend

I’d try open the spam post in your browser and find the post ID. This will be in a rel=”shortlink” tag in the HTML header: <link rel=”shortlink” href=”https://example.com/?p=123″ /> or as a class page-id-123 or similar on the body tag: <body class=”page-template-default page page-id-123 logged-in admin-bar no-customize-support”> edit that ID into your normal edit post … Read more

Suspicious Files

When someone sends a POST request with a variable php and a base 64 encoded value that is PHP code after decoding it, that PHP code will run with the permissions of all your own PHP files. The attacker can read all database content, create new users, upload files … The second code does the … Read more

Hata!: SQLSTATE[HY000] [1045] Access denied for user 'divattrend_liink'@'localhost' (using password: YES)