{"id":969,"date":"2020-09-08T09:59:21","date_gmt":"2020-09-08T09:59:21","guid":{"rendered":"https:\/\/www.spletnogostovanje.biz\/?p=969"},"modified":"2020-09-08T10:22:12","modified_gmt":"2020-09-08T10:22:12","slug":"vsaj-350-000-wordpress-ranljivih-strani","status":"publish","type":"post","link":"https:\/\/www.spletnogostovanje.biz\/index.php\/2020\/09\/08\/vsaj-350-000-wordpress-ranljivih-strani\/","title":{"rendered":"Vsaj 350.000 WordPress ranljivih strani"},"content":{"rendered":"\n<p>Ve\u010d spletnih portalov poro\u010da o ranljivosti wordpress sistema oz. natan\u010dneje o ranljivosti vti\u010dnika <strong>File Manager za wordpress<\/strong>.  Vsi, ki uporabljate wordpress z vti\u010dnikom File Manager  (trenutno naj bi bilo vsaj 700.000 aktivnih vti\u010dnikov in od tega naj bi bilo vsaj 52% ranljivih) preverite, \u010de ste med ranljivo skupino.  V kolikor imate ranljiv <strong>File Manager vti\u010dnik<\/strong> so ali pa \u0161e bodo napadalci nalo\u017eili zlonamerno kodo v mapo<strong> \/wp-content\/plugins\/wp-file-manager\/lib\/files<\/strong> tako, da preverite, \u010de ste slu\u010dajno \u017ee bili tar\u010da hackerjev. <\/p>\n\n\n\n<p>Po do sedaj znanih podatkih so ranljivi vsi uporabniki vti\u010dnika File manager v. 6.8 in ni\u017eje. Predlagamo, da ga \u010dimprej nadgradite na verzijo 6.9 in sledite objavam na povezavi <strong>https:\/\/wpvulndb.com\/<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ve\u010d spletnih portalov poro\u010da o ranljivosti wordpress sistema oz. natan\u010dneje o ranljivosti vti\u010dnika File Manager za wordpress. Vsi, ki uporabljate wordpress z vti\u010dnikom File Manager (trenutno naj bi bilo vsaj 700.000 aktivnih vti\u010dnikov in od tega naj bi bilo vsaj 52% ranljivih) preverite, \u010de ste med ranljivo skupino. V kolikor imate ranljiv File Manager vti\u010dnik so ali pa \u0161e bodo napadalci nalo\u017eili zlonamerno kodo v mapo \/wp-content\/plugins\/wp-file-manager\/lib\/files tako, da preverite, \u010de ste slu\u010dajno \u017ee bili tar\u010da hackerjev. Po do sedaj znanih podatkih so ranljivi vsi uporabniki vti\u010dnika File manager v.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":973,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[155,156,147,27,30],"class_list":["post-969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-varnost","tag-file-manager","tag-hacked","tag-vdor","tag-virus","tag-wordpress"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/posts\/969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/comments?post=969"}],"version-history":[{"count":4,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/posts\/969\/revisions"}],"predecessor-version":[{"id":975,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/posts\/969\/revisions\/975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/media\/973"}],"wp:attachment":[{"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/media?parent=969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/categories?post=969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spletnogostovanje.biz\/index.php\/wp-json\/wp\/v2\/tags?post=969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}