Report

Version: 0.10.4
Scan date: 2023-10-28 03:40:08
Files analyzed: 1615 | Files infected: 10

/home1/eoneweb/public_html/eoneweb/wp-admin/includes/class-pclzip.php

Size: 192.08 kB Created: 2023-05-19 13:27:20 Modified: 2023-10-18 08:06:05 Dangers: 4
DescriptionMatch

Exploit nano Line: 2627 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_PRE_ADD](PCLZIP_CB_PRE_ADD$v_local_header)

Exploit nano Line: 2785 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_POST_ADD](PCLZIP_CB_POST_ADD$v_local_header)

Exploit nano Line: 3707 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_PRE_EXTRACT](PCLZIP_CB_PRE_EXTRACT$v_local_header)

Exploit nano Line: 3958 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_POST_EXTRACT](PCLZIP_CB_POST_EXTRACT$v_local_header)

/home1/eoneweb/public_html/eoneweb/wp-admin/includes/class-wp-debug-data.php

Size: 59.66 kB Created: 2023-07-09 19:52:24 Modified: 2023-10-18 08:06:05 Dangers: 1
DescriptionMatch

Exploit php_uname Line: 684 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

php_uname'm' )

/home1/eoneweb/public_html/eoneweb/wp-admin/includes/file.php

Size: 92.88 kB Created: 2023-07-10 20:33:23 Modified: 2023-10-18 08:06:05 Dangers: 1
DescriptionMatch

Exploit nano Line: 794 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$overrides['upload_error_handler']( &$file$message )

/home1/eoneweb/public_html/eoneweb/wp-content/themes/Divi/includes/builder/feature/display-conditions/DisplayConditions.php

Size: 19.49 kB Created: 2023-10-25 21:00:40 Modified: 2023-10-25 21:00:40 Dangers: 2
DescriptionMatch

Exploit execution Line: 370 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode$_COOKIE['divi_post_visit'] )

Exploit execution Line: 462 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode$_COOKIE['divi_module_views'] )

/home1/eoneweb/public_html/eoneweb/wp-content/themes/Divi/includes/builder/module/field/display-conditions/NumberOfViews.php

Size: 2.41 kB Created: 2023-10-25 21:00:40 Modified: 2023-10-25 21:00:40 Dangers: 1
DescriptionMatch

Exploit execution Line: 39 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode$_COOKIE['divi_module_views'] )

/home1/eoneweb/public_html/eoneweb/wp-content/themes/Divi/includes/builder/module/field/display-conditions/PageVisit.php

Size: 1.96 kB Created: 2023-10-25 21:00:40 Modified: 2023-10-25 21:00:40 Dangers: 1
DescriptionMatch

Exploit execution Line: 43 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode$_COOKIE['divi_post_visit'] )

/home1/eoneweb/public_html/eoneweb/wp-content/themes/Divi/includes/builder/class-et-builder-element.php

Size: 893.50 kB Created: 2023-10-25 21:00:40 Modified: 2023-10-25 21:00:40 Warns: 3
DescriptionMatch

Exploit double_var2 Line: 1259 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

Exploit double_var2 Line: 1273 Warning

Double var technique is usually used for the obfuscation of malicious code

${$new_prop}

Exploit double_var2 Line: 1342 Warning

Double var technique is usually used for the obfuscation of malicious code

${$replacement}

/home1/eoneweb/public_html/eoneweb/wp-content/themes/Divi/includes/builder/class-et-builder-module-shortcode-manager.php

Size: 20.94 kB Created: 2023-10-25 21:00:40 Modified: 2023-10-25 21:00:40 Dangers: 1
DescriptionMatch

Exploit nano Line: 710 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$module['classname']()

/home1/eoneweb/public_html/eoneweb/wp-includes/SimplePie/Parse/Date.php

Size: 20.07 kB Created: 2020-05-01 14:26:07 Modified: 2023-10-18 08:06:06 Warns: 1
DescriptionMatch

Exploit concat_vars_with_spaces Line: 837 Warning

Concatenation of vars technique is usually used for the obfuscation of malicious code

$day $fws $month $fws $year $fws .

/home1/eoneweb/public_html/eoneweb/wp-includes/rest-api.php

Size: 94.79 kB Created: 2023-10-12 13:15:24 Modified: 2023-10-18 08:06:06 Dangers: 1
DescriptionMatch

Exploit nano Line: 1630 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$checks$type ]( $value )