[Plugin: WordPress Exploit Scanner] Evals and Base 64’s
-
Excuse me for being ignorant. But I’m learning. What is this stuff?
Could be JavaScript code used to hide code inserted by a hacker.
input = eval(‘(‘ + input + ‘)’);I have six of the above input = eval(‘(‘ + input + ‘)’); in php’s of some plugins. And one each in plugin php’s below.
Often used by malicous scripts to decode previously encoded data, such as malicious URLs
$data = base64_decode($data);
eval( $cache );Often used by malicous scripts to decode previously encoded data, such as malicious URLs
$content = base64_decode($resources[ $_GET[‘resource’] ]);Could be JavaScript code used to hide code inserted by a hacker.
strpos($_SERVER[‘REQUEST_URI’], “eval(“) ||Do I have a problem? Or this this normal?
- The topic ‘[Plugin: WordPress Exploit Scanner] Evals and Base 64’s’ is closed to new replies.