doubleval($_POST[ is not malicious
-
Hi,
Just because I have “doubleval($_POST[” in my code doesn’t mean I’m a hacker.
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval($_POST[”
Are there any plans to fix this? Otherwise I’ll need to slightly modify my code to workaround this so I can assure people who use my plugin I’m not trying to do anything malicious.
Thanks,
Daniel
Viewing 3 replies - 1 through 3 (of 3 total)
Viewing 3 replies - 1 through 3 (of 3 total)
The topic ‘doubleval($_POST[ is not malicious’ is closed to new replies.