[Plugin: Exploit Scanner] – Results
-
Location / Description What was matched wp-includes/functions.php:174 Often used to execute malicious code if ( doubleval($bytes) >= $mag ) wp-content/plugins/cms-tree-page-view/FirePHPCore/FirePHP.class.php:1194 Often used to execute malicious code * Javascript, and can be directly eval()'ed with no further parsing wp-content/plugins/cms-tree-page-view/FirePHPCore/FirePHP.class.php4:978 Often used to execute malicious code * Javascript, and can be directly eval()'ed with no further parsing wp-content/plugins/contact-form-7/scripts.js:49 Often used to execute malicious code $.each(data.onSentOk, function(i, n) { eval(n) }); wp-content/plugins/contact-form-7/scripts.js:55 Often used to execute malicious code $.each(data.onSubmit, function(i, n) { eval(n) }); wp-content/themes/projekteins/js/jquery-1.3.2.min.js:12 Often used to execute malicious code :false,dataType:"script"})}else{o.globalEval(F.text||F.textContent||F.innerHTML||"" wp-content/themes/projekteins/js/jquery-1.3.2.min.js:19 Often used to execute malicious code t;string"){if(H=="script"){o.globalEval(I)}if(H=="json"){I=l["eval"
Thanks!
Viewing 1 replies (of 1 total)
Viewing 1 replies (of 1 total)
- The topic ‘[Plugin: Exploit Scanner] – Results’ is closed to new replies.