• Location / Description 	What was matched
    wp-includes/functions.php:174
    Often used to execute malicious code	if ( doubleval($bytes) >= $mag )
    wp-content/plugins/cms-tree-page-view/FirePHPCore/FirePHP.class.php:1194
    Often used to execute malicious code	* Javascript, and can be directly eval()'ed with no further parsing
    wp-content/plugins/cms-tree-page-view/FirePHPCore/FirePHP.class.php4:978
    Often used to execute malicious code	* Javascript, and can be directly eval()'ed with no further parsing
    wp-content/plugins/contact-form-7/scripts.js:49
    Often used to execute malicious code	$.each(data.onSentOk, function(i, n) { eval(n) });
    wp-content/plugins/contact-form-7/scripts.js:55
    Often used to execute malicious code	$.each(data.onSubmit, function(i, n) { eval(n) });
    wp-content/themes/projekteins/js/jquery-1.3.2.min.js:12
    Often used to execute malicious code	:false,dataType:"script"})}else{o.globalEval(F.text||F.textContent||F.innerHTML||""
    wp-content/themes/projekteins/js/jquery-1.3.2.min.js:19
    Often used to execute malicious code	t;string"){if(H=="script"){o.globalEval(I)}if(H=="json"){I=l["eval"

    Thanks!

Viewing 1 replies (of 1 total)
Viewing 1 replies (of 1 total)
  • The topic ‘[Plugin: Exploit Scanner] – Results’ is closed to new replies.