/home1/animalphysio/public_html/wp-admin/includes/class-pclzip.php Size: 192.08 kB Created: 2023-05-19 13:27:20 Modified: 2023-10-18 19:52:18 Dangers: 4
Description | Match |
---|
Exploit nano Line: 2627 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$p_options[PCLZIP_CB_PRE_ADD](PCLZIP_CB_PRE_ADD, $v_local_header)
| Exploit nano Line: 2785 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$p_options[PCLZIP_CB_POST_ADD](PCLZIP_CB_POST_ADD, $v_local_header)
| Exploit nano Line: 3707 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$p_options[PCLZIP_CB_PRE_EXTRACT](PCLZIP_CB_PRE_EXTRACT, $v_local_header)
| Exploit nano Line: 3958 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$p_options[PCLZIP_CB_POST_EXTRACT](PCLZIP_CB_POST_EXTRACT, $v_local_header)
|
|
/home1/animalphysio/public_html/wp-admin/includes/file.php Size: 92.88 kB Created: 2023-07-10 20:33:23 Modified: 2023-10-18 19:52:18 Dangers: 1
Description | Match |
---|
Exploit nano Line: 794 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$overrides['upload_error_handler']( &$file, $message )
|
|
/home1/animalphysio/public_html/wp-admin/includes/class-wp-debug-data.php Size: 59.66 kB Created: 2023-07-09 19:52:24 Modified: 2023-10-18 19:52:18 Dangers: 1
Description | Match |
---|
Exploit php_uname Line: 684 Dangerous RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine |
php_uname( 'm' )
|
|
/home1/animalphysio/public_html/wp-content/plugins/wordfence/lib/wordfenceClass.php Size: 436.59 kB Created: 2023-10-31 22:51:14 Modified: 2023-10-31 22:51:14 Dangers: 2
Description | Match |
---|
Exploit execution Line: 8103 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP [https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html] |
base64_decode($_POST['paramKey'])
| Exploit file_prepend Line: 9853 Dangerous LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
php_value auto_prepend_file
|
|
/home1/animalphysio/public_html/wp-content/plugins/wordfence/waf/bootstrap.php Size: 33.63 kB Created: 2023-10-31 22:51:14 Modified: 2023-10-31 22:51:14 Warns: 1 Dangers: 1
Description | Match |
---|
Exploit double_var2 Line: 876 Warning Double var technique is usually used for the obfuscation of malicious code |
${$variable}
| Exploit file_prepend Line: 4 Dangerous LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
php_value auto_prepend_file
|
|
/home1/animalphysio/public_html/wp-content/themes/Divi/includes/builder/feature/display-conditions/DisplayConditions.php Size: 19.49 kB Created: 2023-10-31 02:26:24 Modified: 2023-10-31 02:26:24 Dangers: 2
|
/home1/animalphysio/public_html/wp-content/themes/Divi/includes/builder/module/field/display-conditions/NumberOfViews.php Size: 2.41 kB Created: 2023-10-31 02:26:24 Modified: 2023-10-31 02:26:24 Dangers: 1
|
/home1/animalphysio/public_html/wp-content/themes/Divi/includes/builder/module/field/display-conditions/PageVisit.php Size: 1.96 kB Created: 2023-10-31 02:26:24 Modified: 2023-10-31 02:26:24 Dangers: 1
|
/home1/animalphysio/public_html/wp-content/themes/Divi/includes/builder/class-et-builder-element.php Size: 893.50 kB Created: 2023-10-31 02:26:24 Modified: 2023-10-31 02:26:24 Warns: 3
Description | Match |
---|
Exploit double_var2 Line: 1259 Warning Double var technique is usually used for the obfuscation of malicious code |
${$name}
| Exploit double_var2 Line: 1273 Warning Double var technique is usually used for the obfuscation of malicious code |
${$new_prop}
| Exploit double_var2 Line: 1342 Warning Double var technique is usually used for the obfuscation of malicious code |
${$replacement}
|
|
/home1/animalphysio/public_html/wp-content/themes/Divi/includes/builder/class-et-builder-module-shortcode-manager.php Size: 20.94 kB Created: 2023-10-31 02:26:24 Modified: 2023-10-31 02:26:24 Dangers: 1
Description | Match |
---|
Exploit nano Line: 710 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$module['classname']()
|
|
/home1/animalphysio/public_html/wp-content/wflogs/config-transient.php Size: 1.40 MB Created: 2023-11-01 08:39:22 Modified: 2023-11-07 07:38:20 Warns: 2
Description | Match |
---|
Exploit base64_long Line: 6 Warning Long Base64 encoded text is usually used for the obfuscation of malicious code |
"LtyeOgWuDxRbF3p3gXdrYKGVb5Se4ghRtWBpEH0LeObkVEyi2DLEG9VLsLUd7+ihXdqs8tQU/JitWHG9xrQSw0Jbh/koXBFIJBUT/GdmVQn/bee3SsZiiReOJkUOUa7mg2rY0Z1/eDO1Kx2Z2KfNQtxcO+yE5Wp5Z6wmsiZIru+jLZXXxhoqw7kVdcx5AfpBcJWB5ipAUCZfKCuQfslJWJmWA5etMHdt+iBVhjzvzlpyLSaMBIQ1V7IREn+6e0YZLfDVNRyEnmO+uigj6bPeKwm/2mZmPx96zX/3E+vhHLfMx2XV1LLrWQNpm4ckF7V0ArvE1qkfBkzb4gq4d3WpTw=="
| Exploit base64_long Warning Long Base64 encoded text is usually used for the obfuscation of malicious code |
"PV8MNGNqDQISLSobDQceGmUVJUgYHGNPHxI9djwUHhQWGkpXDUQhcERmYFQPChccLTYmKiEcNARyGmYIOGgxGUpfbDQbOSI1PSkaGClrBmtlYGZbUmJjHiAneXY8Eh5qa1FleEZsX3BOZmBeFGQEfDAmWypfJhsEDGRmejgWFRk6IR40HQlfNj5YKmUpFXJrFxV/HCJiY2BsJ3l2QmAeZmtRZQY0bFNwTgxgUhQadgJOJlcqIWk0enIaZghKaGsPOl9sNBEJXzU+VCobW2sMaxsVAVciYmMeHid1dkJgYBRrXWUGDFUhDjBmEixqGnoCMFQpVB4bSgRyFmZ2C2hrZzpTbEpjdyE2TCpUG1drchllawFbIhwRYGAneXY8Eh5qa1FleEZsX0gwGGAsZhp6Ak4mKVghZTR6cmQUCEZoa2c6U2xKWglfSE5UGSkTRRgDZjgvCRwxTR5uWQd2REgqIUQsX00EVSFwU1VMTTguKDcCHBpUUWV...
|
|
/home1/animalphysio/public_html/wp-includes/SimplePie/Parse/Date.php Size: 20.07 kB Created: 2020-05-01 14:26:07 Modified: 2023-10-18 19:52:18 Warns: 1
Description | Match |
---|
Exploit concat_vars_with_spaces Line: 837 Warning Concatenation of vars technique is usually used for the obfuscation of malicious code |
$day . $fws . $month . $fws . $year . $fws .
|
|
/home1/animalphysio/public_html/wp-includes/rest-api.php Size: 94.79 kB Created: 2023-10-12 13:15:24 Modified: 2023-10-18 19:52:18 Dangers: 1
Description | Match |
---|
Exploit nano Line: 1630 Dangerous Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient [https://github.com/s0md3v/nano] |
$checks[ $type ]( $value )
|
|
/home1/animalphysio/home/animalphysio/public_html/.well-known/pki-validation/18728313-1ab3-4f0e-98ef-6c21af594b6b.php Size: 1.03 kB Created: 2023-09-12 13:04:19 Modified: 2023-09-12 13:04:19 Dangers: 2
Description | Match |
---|
Exploit eval_base64 Line: 10 Dangerous RCE (Remote Code Execution), through Base64 text, allow remote attackers to execute arbitrary commands or code on the target machine |
eval(base64_decode(strrev($t841a2d689ad8)
| Exploit execution Line: 10 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP [https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html] |
eval(base64_decode(strrev($t841a2d689ad8)
|
|
/home1/animalphysio/home/animalphysio/public_html/.well-known/pki-validation/f0a51b63-c8e7-4743-b624-25316c4e0d2f.php Size: 92.60 kB Created: 2023-09-12 14:26:05 Modified: 2023-09-12 14:26:05 Warns: 1
Description | Match |
---|
Exploit double_var2 Line: 1897 Warning Double var technique is usually used for the obfuscation of malicious code |
${$current}
|
|
/home1/animalphysio/home/animalphysio/public_html/.well-known/pki-validation/feb09c6d-74b9-4ae7-976b-767e8335ef11.php Size: 92.69 kB Created: 2023-09-18 07:14:40 Modified: 2023-09-18 07:14:40 Warns: 1
Description | Match |
---|
Exploit double_var2 Line: 1897 Warning Double var technique is usually used for the obfuscation of malicious code |
${$current}
|
|
/home1/animalphysio/home/animalphysio/public_html/.well-known/pki-validation/685ea645-49fc-4475-bd14-9db486a4537b.php Size: 92.69 kB Created: 2023-09-18 17:32:42 Modified: 2023-09-18 17:32:42 Warns: 1
Description | Match |
---|
Exploit double_var2 Line: 1897 Warning Double var technique is usually used for the obfuscation of malicious code |
${$current}
|
|
/home1/animalphysio/home/animalphysio/public_html/.well-known/pki-validation/d56da876-bce3-4609-bb90-65c99e63d046.php Size: 92.60 kB Created: 2023-09-18 17:33:03 Modified: 2023-09-18 17:33:03 Warns: 1
Description | Match |
---|
Exploit double_var2 Line: 1897 Warning Double var technique is usually used for the obfuscation of malicious code |
${$current}
|
|
/home1/animalphysio/home/animalphysio/public_html/.well-known/pki-validation/929deb3a-9fa1-46a1-a933-3859ac4b7459.php Size: 1.03 kB Created: 2023-09-18 17:32:47 Modified: 2023-09-18 17:32:47 Dangers: 2
Description | Match |
---|
Exploit eval_base64 Line: 10 Dangerous RCE (Remote Code Execution), through Base64 text, allow remote attackers to execute arbitrary commands or code on the target machine |
eval(base64_decode(strrev($t841a2d689ad8)
| Exploit execution Line: 10 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP [https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html] |
eval(base64_decode(strrev($t841a2d689ad8)
|
|