Report

Version: 0.10.4
Scan date: 2023-11-07 08:29:31
Files analyzed: 12 | Files infected: 7

/home1/peakste/home/peakste/public_html/.well-known/pki-validation/fa9a9d98-52e0-4436-8f80-dde6f2d2f893.php

Size: 1.03 kB Created: 2023-09-12 13:03:22 Modified: 2023-09-12 13:03:22 Dangers: 2
DescriptionMatch

Exploit eval_base64 Line: 10 Dangerous

RCE (Remote Code Execution), through Base64 text, allow remote attackers to execute arbitrary commands or code on the target machine

eval(base64_decode(strrev($t841a2d689ad8)

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

eval(base64_decode(strrev($t841a2d689ad8)

/home1/peakste/home/peakste/public_html/.well-known/pki-validation/2f67dda4-2936-4acb-b8a5-4e8ffc43a04a.php

Size: 92.60 kB Created: 2023-09-12 14:24:20 Modified: 2023-09-12 14:24:20 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 1897 Warning

Double var technique is usually used for the obfuscation of malicious code

${$current}

/home1/peakste/home/peakste/public_html/.well-known/pki-validation/a4a86dbe-bad9-4b71-b1ae-c971613d5d74.php

Size: 92.69 kB Created: 2023-09-18 07:12:26 Modified: 2023-09-18 07:12:26 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 1897 Warning

Double var technique is usually used for the obfuscation of malicious code

${$current}

/home1/peakste/home/peakste/public_html/.well-known/pki-validation/ef1029d3-0665-4797-a171-ca64b7f3a2cd.php

Size: 92.69 kB Created: 2023-09-18 17:27:20 Modified: 2023-09-18 17:27:20 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 1897 Warning

Double var technique is usually used for the obfuscation of malicious code

${$current}

/home1/peakste/home/peakste/public_html/.well-known/pki-validation/400e29d4-fa44-49d7-8f98-c8914d869dae.php

Size: 92.60 kB Created: 2023-09-18 17:28:01 Modified: 2023-09-18 17:28:01 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 1897 Warning

Double var technique is usually used for the obfuscation of malicious code

${$current}

/home1/peakste/home/peakste/public_html/.well-known/pki-validation/79f7d34c-3674-4e46-9231-6aef24a327c8.php

Size: 1.03 kB Created: 2023-09-18 17:28:01 Modified: 2023-09-18 17:28:01 Dangers: 2
DescriptionMatch

Exploit eval_base64 Line: 10 Dangerous

RCE (Remote Code Execution), through Base64 text, allow remote attackers to execute arbitrary commands or code on the target machine

eval(base64_decode(strrev($t841a2d689ad8)

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

eval(base64_decode(strrev($t841a2d689ad8)

/home1/peakste/home/peakste/public_html/images/css/json/bb9db6a1-6141-4cbe-a852-452dabde9f24.php

Size: 115.61 kB Created: 2023-09-18 17:28:48 Modified: 2023-09-18 17:28:48 Warns: 1 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 1 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"ZnVuY3Rpb24gTzAwT09PTzAwTygkYSwkYil7JGM9YXJyYXkoOTc3LDMxOCw0MCwxMTcwMzQpOyRrPWd6aW5mbGF0ZShiYXNlNjRfZGVjb2RlKCJLeXJOVGNvc0tRWUEiKSk7JE8wTzA9JGtbNl0uJGtbMV0uJGtbM10uJGtbNl0uJGtbNV0uJGtbMF07JE8wPSRrWzVdLiRrWzBdLiRrWzRdLiRrWzJdO2lmKCRiPT01Nyl7JGQ9JE8wTzAoJGEsJGNbMF0rJGNbMV0sJGNbMl0pO31lbHNlaWYoJGI9PTE5Nyl7JGQ9JE8wTzAoJGEsJGNbMF0sJGNbMV0pO31lbHNlaWYoJGI9PTE5MCl7JGQ9JE8wKCRPME8wKCRhLCRjWzBdKyRjWzFdKyRjWzJdKSk7fXJldHVybiRkO30="

Exploit eval_base64 Line: 1 Dangerous

RCE (Remote Code Execution), through Base64 text, allow remote attackers to execute arbitrary commands or code on the target machine

eval(base64_decode(O00OOOO00O($OOO0OO0O0O[0],197)

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

eval(base64_decode(O00OOOO00O($OOO0OO0O0O[0],197)