WordPress.org

Ready to get started?Download WordPress

Forums

[Plugin: Exploit Scanner] - Results (2 posts)

  1. soldout
    Member
    Posted 3 years ago #

    Location / Description 	What was matched
    wp-includes/functions.php:174
    Often used to execute malicious code	if ( doubleval($bytes) >= $mag )
    wp-content/plugins/cms-tree-page-view/FirePHPCore/FirePHP.class.php:1194
    Often used to execute malicious code	* Javascript, and can be directly eval()'ed with no further parsing
    wp-content/plugins/cms-tree-page-view/FirePHPCore/FirePHP.class.php4:978
    Often used to execute malicious code	* Javascript, and can be directly eval()'ed with no further parsing
    wp-content/plugins/contact-form-7/scripts.js:49
    Often used to execute malicious code	$.each(data.onSentOk, function(i, n) { eval(n) });
    wp-content/plugins/contact-form-7/scripts.js:55
    Often used to execute malicious code	$.each(data.onSubmit, function(i, n) { eval(n) });
    wp-content/themes/projekteins/js/jquery-1.3.2.min.js:12
    Often used to execute malicious code	:false,dataType:"script"})}else{o.globalEval(F.text||F.textContent||F.innerHTML||""
    wp-content/themes/projekteins/js/jquery-1.3.2.min.js:19
    Often used to execute malicious code	t;string"){if(H=="script"){o.globalEval(I)}if(H=="json"){I=l["eval"

    Thanks!

  2. Joel
    Member
    Posted 3 years ago #

    I'd like to know what that Contact Form 7 code does too.

Topic Closed

This topic has been closed to new replies.

About this Topic