/home/web/web/vsavto.com/public_html/bitrix/catalog_export/yandex_379820.php Size: 4.31 MB Created: 2025-02-10 08:14:48 Modified: 2025-02-10 08:14:48 Dangers: 1
Description | Match |
---|
Sign ee1cb326 Line: 19613 Dangerous Malware Signature (hash: ee1cb326) |
9wzw
|
|
/home/web/web/vsavto.com/public_html/bitrix/activities/bitrix/codecondition/codecondition.php Size: 1.87 kB Created: 2022-12-02 21:27:38 Modified: 2025-02-10 08:08:44 Warns: 1 Dangers: 2
Description | Match |
---|
Exploit silenced_eval Line: 19 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval("\$result = ".$this->condition.";")
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("\$result = ".$this->condition.";"); return $result; } public static function ValidateProperties($value = null, CBPWorkflowTemplateUser $user = null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = [ 'code' => 'perm', 'message' => GetMessage('BPCC_NO_PERMS'), ]; } return array_merge($arErrors, parent::ValidateProperties($value, $user)); } public static function GetPropertiesDialog( $documentType, $arWorkflowTemplate, $arWorkflowParameters, $arWorkflowVariables...
| Sign 696317c4 Line: 19 Dangerous Malware Signature (hash: 696317c4) |
@eval("\
|
|
/home/web/web/vsavto.com/public_html/bitrix/activities/bitrix/codeactivity/codeactivity.php Size: 2.44 kB Created: 2022-12-02 21:27:38 Modified: 2025-02-10 08:08:44 Warns: 1 Dangers: 1
Description | Match |
---|
Exploit silenced_eval Line: 16 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval($this->ExecuteCode)
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($this->ExecuteCode); return CBPActivityExecutionStatus::Closed; } public static function ValidateProperties($arTestProperties = array(), CBPWorkflowTemplateUser $user = null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = array( "code" => "perm", "message" => GetMessage("BPCA_NO_PERMS"), ); } if ($arTestProperties["ExecuteCode"] == '') { $arErrors[] = array( "code" => "emptyCode", "message" => GetMessage("BPCA_EMPTY_CODE"), ); } return array_merge($arErrors, ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/index.php Size: 83.00 B Created: 2022-12-02 21:27:42 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 0f37c730 Line: 2 Dangerous Malware Signature (hash: 0f37c730) |
meta http-equiv="REFRESH" content="0;
|
|
/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main3/component_epilog.php Size: 69.38 kB Created: 2023-02-02 23:43:12 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 500 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main5/component_epilog.php Size: 69.36 kB Created: 2023-02-02 23:43:12 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 495 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main/component_epilog.php Size: 73.82 kB Created: 2023-02-02 23:43:12 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 915 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS_{$templateData[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main2/component_epilog.php Size: 66.01 kB Created: 2023-02-02 23:43:12 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 503 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/catalog.element/main4/component_epilog.php Size: 78.58 kB Created: 2023-02-02 23:43:12 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 944 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS_{$templateData[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/templates/aspro_next/components/bitrix/sale.gift.main.products/main/template.php Size: 6.68 kB Created: 2023-02-02 23:43:14 Modified: 2025-02-10 08:08:45 Dangers: 2
Description | Match |
---|
Exploit clever_include Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""), "ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""), "LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "OFFER_ADD_PICT_PROP" => (isset($arPara...
| Exploit clever_include Line: 79 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""),
"ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""),
"LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "O...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main3/component_epilog.php Size: 69.38 kB Created: 2023-02-02 23:31:06 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 500 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main5/component_epilog.php Size: 69.36 kB Created: 2023-02-02 23:31:06 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 495 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main/component_epilog.php Size: 73.82 kB Created: 2023-02-02 23:31:06 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 915 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS_{$templateData[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main2/component_epilog.php Size: 66.01 kB Created: 2023-02-02 23:31:06 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 503 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main4/component_epilog.php Size: 78.58 kB Created: 2023-02-02 23:31:06 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 944 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS_{$templateData[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/aspro/next/site/templates/aspro_next/components/bitrix/sale.gift.main.products/main/template.php Size: 6.68 kB Created: 2023-02-02 23:31:08 Modified: 2025-02-10 08:08:45 Dangers: 2
Description | Match |
---|
Exploit clever_include Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""), "ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""), "LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "OFFER_ADD_PICT_PROP" => (isset($arPara...
| Exploit clever_include Line: 79 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""),
"ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""),
"LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "O...
|
|
/home/web/web/vsavto.com/public_html/bitrix/wizards/bitrix/demo/scripts/template.php Size: 15.72 kB Created: 2022-12-02 21:28:16 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Line: 462 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(response); }
CAjaxForm.prototype.ShowError = function(errorMessage) { var errorContainer = document.getElementById("error_container"); var errorText = document.getElementById("error_text"); if (!errorContainer || !errorText) return;
var waitWindow = document.getElementById("wait"); if (waitWindow) waitWindow.style.display = "none";
errorContainer.style.display = 'block'; errorText.innerHTML = strip_tags(errorMessage);
var retryButton = ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.element/templates/.default/template.php Size: 64.58 kB Created: 2022-12-02 21:28:20 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 1132 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.element/templates/bootstrap_v4/template.php Size: 64.75 kB Created: 2022-12-02 21:28:20 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 1167 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'], 'CACH...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.element/templates/store_v3/template.php Size: 67.30 kB Created: 2022-12-02 21:28:20 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit clever_include Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'], 'CACHE_GROUPS' => $arParams['CACHE_GROUPS'], 'POTENTI...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/landing.start/lang/en/component.php Size: 5.85 kB Created: 2022-12-02 21:28:22 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 301ca578 Line: 36 Dangerous Malware Signature (hash: 301ca578) |
Trojan
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/landing.start/lang/de/component.php Size: 6.55 kB Created: 2022-12-02 21:28:22 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 301ca578 Line: 36 Dangerous Malware Signature (hash: 301ca578) |
Trojan
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.location.import/templates/.default/template.php Size: 15.64 kB Created: 2022-12-02 21:28:24 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 7830f7a6 Line: 11 Dangerous Malware Signature (hash: 7830f7a6) |
nc-l
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.location.import/templates/admin/template.php Size: 13.68 kB Created: 2022-12-02 21:28:24 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 7830f7a6 Line: 17 Dangerous Malware Signature (hash: 7830f7a6) |
nc-l
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.sections.top/component.php Size: 17.92 kB Created: 2022-12-02 21:28:24 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 180 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php Size: 9.56 kB Created: 2022-12-02 21:28:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("var result = " + data + "; "); } if (result['status'] == 'inprogress') { document.getElementById('photogallery_recalc').innerHTML = result['text']; if (__this_source.bReady == false) { document.getElementById('ButtonPhotoGalleryRecalcStart').disabled = false; document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled = false; document.getElementById('ButtonPhotoGalleryRecalcStop').disabled = true; } else { document.getElementById(...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php Size: 0.99 kB Created: 2022-12-02 21:28:32 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 15 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php Size: 864.00 B Created: 2022-12-02 21:28:32 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 15 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/main.ui.grid/templates/.default/template.php Size: 49.30 kB Created: 2022-12-02 21:28:34 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>); var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>); var Grid = BX.Main.gridManager.getById('<?=\CUtil::JSEscape($arParams["GRID_ID"])?>'); var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>); var currentPage = '<?=\CUtil::JSEscape($arParams["CURRENT_PAGE"])?>';
Grid = Grid ? Grid.instance : null;
if (Grid) { Grid.arParams.DEFAULT_COLUMNS = defaultColumns; Grid.arPa...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/forum.rules/lang/en/component.php Size: 4.71 kB Created: 2022-12-02 21:28:38 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 407651f7 Line: 27 Dangerous Malware Signature (hash: 407651f7) |
warez
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/mobileapp.menu/templates/.default/template.php Size: 12.57 kB Created: 2022-12-02 21:28:38 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec("showAuthForm"); } } <?endif;?>
if(BX.PULL) { BX.addCustomEvent("onPullExtendWatch", function(data) { BX.PULL.extendWatch(data.id); });
BX.addCustomEvent("thisPageWillDie", function(data) { BX.PULL.clearWatch(data.page_id); });
BX.addCustomEvent("onPullEvent", function (module_id, command, params) { if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list')) { //app.onCustomEvent('onPullOnline', {...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/lists.element.edit/component.php Size: 33.70 kB Created: 2022-12-02 21:28:40 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 606 Dangerous Malware Signature (hash: 11413268) |
eval($_POST
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php Size: 11.35 kB Created: 2022-12-02 21:28:40 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open");
if (tagOpen == 0) { if (doInsert("[" + thetag + "]", "[/" + thetag + "]", true)) { eval(thetag + "_open = 1"); // Change the button status
pushstack(bbtags, thetag); cstat(); } } else { // Find the last occurance of the opened tag lastindex = 0;
for (i = 0 ; i < bbtags.length; i++ ) { if ( bbtags[i] == thetag ) { lastindex = i; } }
// Close all tags opened up to that tag was opened while (bbtags[lastindex]) { tagR...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php Size: 22.93 kB Created: 2022-12-02 21:28:40 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Line: 97 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open");
if (tagOpen == 0) { if (doInsert("[" + thetag + "]", "[/" + thetag + "]", true)) { eval(thetag + "_open = 1"); // Change the button status
pushstack(bbtags, thetag); cstat(); } } else { // Find the last occurance of the opened tag lastindex = 0;
for (i = 0 ; i < bbtags.length; i++ ) { if ( bbtags[i] == thetag ) { lastindex = i; } }
// Close all tags opened up to that tag was opened while (bbtags[lastindex]) { tagR...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/report.view/templates/admin/template.php Size: 55.11 kB Created: 2022-12-02 21:28:42 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('response = ' + data); if (response) { if (response.imageData) { if (response.imageData.substr(0,10) === 'data:image') { img = BX('report-chart-image'); img.src = response.imageData; if (response.legendInfo) { var legendContainer = BX('report-chart-legend-container'); var legendRowExample = BX('report-chart-legend-row-example'); var chartType = requestData['type']; var legendNewRow, legendStick, legend...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php Size: 14.80 kB Created: 2022-12-02 21:28:42 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(scripts[s].JS); } } BX.ajax.processScripts(scripts, true); // commentEr object may be set in template if(window.commentEr && window.commentEr == "Y") { BX('err_comment_'+this.id[1]).innerHTML = data; } else { if(BX('edit_id').value > 0) { var commentId = 'blg-comment-'+this.id[1]; if(BX(commentId)) { var newComment = BX.create('div',{'html':data}); // tmp container for data // paste resp...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php Size: 15.25 kB Created: 2022-12-02 21:28:44 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(scripts[s].JS); } } BX.ajax.processScripts(scripts, true); // commentEr object may be set in template if(window.commentEr && window.commentEr == "Y") { BX('err_comment_'+this.id[1]).innerHTML = data; } else { if(BX('edit_id').value > 0) { var commentId = 'blg-comment-'+this.id[1]; if(BX(commentId)) { var newComment = BX.create('div',{'html':data}); // tmp container for data // paste resp...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/b24connector.button.list/ajax.php Size: 4.51 kB Created: 2024-07-17 13:59:08 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { $this->request = Context::getCurrent()->getRequest(); $this->action = $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse(); } } $controller = new B24CButtonListAjaxController(); $controller->exec()
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/photogallery.detail.list/templates/slider_big/template.php Size: 16.21 kB Created: 2022-12-02 21:28:44 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Line: 337 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" + res[ii].href + "');};"); res[ii].parentNode.insertBefore(div, res[ii]); res[ii].onmouseover = function() { this.previousSibling.onshow(); this.bxMouseOver = 'Y'; }; res[ii].onmouseout = function() { this.bxMouseOver = 'N'; var __this = this; setTimeout( function() { if (__this.previousSibling && __this.previousSibling.bxMouseOver != "Y") { __this.previousSibling...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/report.construct/templates/.default/template.php Size: 40.26 kB Created: 2022-12-02 21:28:46 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(ySelects[i].name)) { colId = match[1]; if (colId !== null && yColumnsIndexes[colId] !== null) setSelectValue(ySelects[i], yColumnsIndexes[colId]); } } var chartCheckbox = BX('report-chart-display-checkbox'); if (chartCheckbox) { BX.bind(chartCheckbox, 'click', function () { var chartSwitchBlock = BX('report-chart-switch'); var chartParamsBlock = BX('report-chart-params'); if (chartSwitchBlock) { if (this.checked) BX.addClass(chartSwitchBloc...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/report.construct/templates/admin/template.php Size: 40.02 kB Created: 2022-12-02 21:28:46 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(ySelects[i].name)) { colId = match[1]; if (colId !== null && yColumnsIndexes[colId] !== null) setSelectValue(ySelects[i], yColumnsIndexes[colId]); } } var chartCheckbox = BX('report-chart-display-checkbox'); if (chartCheckbox) { BX.bind(chartCheckbox, 'click', function () { var chartSwitchBlock = BX('report-chart-switch'); var chartParamsBlock = BX('report-chart-params'); if (chartSwitchBlock) { if (this.checked) BX.addClass(chartSwitchBloc...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php Size: 12.71 kB Created: 2022-12-02 21:28:52 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Exploit infected_comment Line: 110 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*width*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/blog.post.edit/templates/.default/script.php Size: 26.06 kB Created: 2022-12-02 21:28:52 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Line: 140 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open");
if (tagOpen == 0) { if (doInsert("[" + thetag + "]", "[/" + thetag + "]", true)) { eval(thetag + "_open = 1"); // Change the button status
pushstack(bbtags, thetag); cstat(); } } else { // Find the last occurance of the opened tag lastindex = 0;
for (i = 0 ; i < bbtags.length; i++ ) { if ( bbtags[i] == thetag ) { lastindex = i; } }
// Close all tags opened up to that tag was opened while (bbtags[lastindex]) { tagR...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.location.selector.system/templates/.default/template.php Size: 17.99 kB Created: 2022-12-02 21:28:52 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php', 'query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&', $urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN, 'pageSize' => $component::PAGE_SIZE, 'hugeTailLen' => $component::HUGE_TA...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.basket.order.ajax/component.php Size: 38.65 kB Created: 2022-12-02 21:28:52 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 556 Dangerous Malware Signature (hash: 11413268) |
eVal($_POST
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/sale.notice.product/templates/.default/template.php Size: 7.43 kB Created: 2022-12-02 21:28:56 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Line: 130 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+res+')' );
if (rs['ERRORS'].length > 0) { if (rs['ERRORS'] == 'NOTIFY_ERR_NULL') BX('popup_n_error').innerHTML = '<?=GetMessageJS('NOTIFY_ERR_NULL')?>'; else if (rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA') BX('popup_n_error').innerHTML = '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>'; else if (rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST') { BX('popup_n_error').innerHTML = '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>'; ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/components/bitrix/main.map/component.php Size: 5.84 kB Created: 2022-12-02 21:28:56 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ".$CONDITION.";"))) continue; } $search_child = false; $search_path = ''; $full_path = ''; if ($aMenu[1] <> '') { if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i", $aMenu[1])) { $full_path = $aMenu[1]; } else { $full_path = trim(Rel2Abs(mb_substr($PARENT_PATH, mb_strlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1])); $slash_pos = mb_strrpos($full_path, "/"); if ($slash_pos !== false) { $page = mb_substr($full_path, $slash_pos + 1); if(($pos = mb_strpos($page, '?')) !== false) $pag...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/classes/general/import.php Size: 288.88 kB Created: 2025-02-10 09:54:47 Modified: 2025-02-10 09:54:47 Warns: 2
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($expression.';'); } elseif(preg_match('/\$val\s*=[^=]/', $expression)) { eval($expression.';'); $ret = $val; } else { $ret = eval('return '.$expression.';'); } }catch(Exception $ex){ $ret = $altReturn; } $this->phpExpression = null; return $ret; } public function ExecuteOnAfterSaveHandler($handler, $ID) { try{ eval($handler.';'); }catch(Exception $ex){} } public function GetNextLoadRow($row, $worksheetNum) { $nextRow = $row; if(isset($this->params['LIST_ACTIVE'][$worksheetNum])) { while($th...
| Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('unzip "'.$arFile['tmp_name'].'" -d '.$archiveParams['path']); if(count(array_diff(scandir($archiveParams['path']), array('.', '..'))) > 0) $isExtract = true; if(!$isExtract && class_exists('ZipArchive')) { $zipObj = new ZipArchive(); if ($zipObj->open(\Bitrix\Main\IO\Path::convertLogicalToPhysical($arFile['tmp_name']))===true) { $isExtract = (bool)($zipObj->extractTo($archiveParams['path']) && count(array_diff(scandir($archiveParams['path']), array('.', '..'))) > 0); $zipObj->close(); } } ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/classes/general/utils.php Size: 107.33 kB Created: 2025-02-10 09:54:47 Modified: 2025-02-10 09:54:47 Warns: 2
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($expression.';'); } elseif(preg_match('/\$val\s*=/', $expression)) { eval($expression.';'); return $val; } else { return eval('return '.$expression.';'); } }catch(Exception $ex){ return $altReturn; } } public static function ShowFilter($sTableID, $IBLOCK_ID, $FILTER) { global $APPLICATION; \CJSCore::Init('file_input'); $sf = 'FILTER'; Loader::includeModule('iblock'); $bCatalog = Loader::includeModule('catalog'); if($bCatalog) { $arCatalog = CCatalog::GetByID($IBLOCK_ID); if($arCatalog) { if...
| Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('unzip "'.$archiveFn.'" -d '.$tmpsubdir); } } if($arFile['type']=='application/zip' && isset($service) && $service=='yadisk') self::CorrectEncodingForExtractDir($tmpsubdir); $arFile = array(); if(!is_array($path)) $urlComponents = parse_url($path); else $urlComponents = array(); if(isset($urlComponents['fragment']) && strlen($urlComponents['fragment']) > 0) { $fn = $tmpsubdir.ltrim($urlComponents['fragment'], '/'); $arFiles = array($fn); if((strpos($fn, '*')!==false || (strpos($fn, '{')!==f...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/classes/general/import_highload.php Size: 62.97 kB Created: 2025-02-10 09:54:47 Modified: 2025-02-10 09:54:47 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($expression.';'); } elseif(preg_match('/\$val\s*=[^=]/', $expression)) { eval($expression.';'); return $val; } else { return eval('return '.$expression.';'); } }catch(Exception $ex){ return $altReturn; } } public function ExecuteOnAfterSaveHandler($handler, $ID) { try{ eval($handler.';'); }catch(Exception $ex){} } public function GetNextLoadRow($row, $worksheetNum) { $nextRow = $row; if(isset($this->params['LIST_ACTIVE'][$worksheetNum])) { while($this->CheckSkipLine($nextRow, $worksheetNum,...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/datamanager/iblockelement.php Size: 52.40 kB Created: 2022-12-20 15:48:52 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('namespace Bitrix\KdaImportexcel\DataManager;'."\r\n". 'class ElementProperty'.$arFilter['IBLOCK_ID'].'Table extends ElementPropertyTable{'."\r\n". 'public static function getMap(){return parent::getMapForIblock('.$arFilter['IBLOCK_ID'].');}'. '}'); self::$arIblockClasses[$arFilter['IBLOCK_ID']] = $arFilter['IBLOCK_ID']; } if(count(array_diff($arNeedKeys, $arFields))==0) { $mtype = 'd7_props'; } else $mtype = 'props'; } } } self::$elemListHash[$hash] = $mtype; } $mtype = self::$elemListHash...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/datamanager/iblockelementid_table.php Size: 2.59 kB Created: 2022-12-20 15:48:40 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('namespace Bitrix\KdaImportexcel\DataManager;'."\r\n". 'class '.$className.' extends \Bitrix\Main\Entity\DataManager{'."\r\n". 'public static function getTableName(){return "b_iblock_element_prop_s'.$IBLOCK_ID.'";}'. 'public static function getMap(){return array(new \Bitrix\Main\Entity\IntegerField("IBLOCK_ELEMENT_ID", array("primary"=>true)));}'. '}'); static::$arIblockV2PropTable[$IBLOCK_ID] = '\Bitrix\KdaImportexcel\DataManager\ElementPropertyV2STable'; } } $className = static::$arIblock...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Reader/Excel5.php Size: 228.08 kB Created: 2022-12-20 15:48:46 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit hacked_by Line: 6624 Dangerous Hacker credits |
Hacked by
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Reader/CSV.php Size: 22.48 kB Created: 2022-12-20 15:48:52 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('locale -a | grep ru', $arLocates); if(is_array($arLocates) && count($arLocates) > 0) { foreach($arLocates as $loc) { $this->arLocales[ToLower(str_replace('-', '', $loc))] = $loc; } } } } protected function _isValidFormat() { return TRUE; } public function setCsvParser($csvparser) { $this->_csvparser = $csvparser; } public function getCsvParser() { return $this->_csvparser; } public function setStartFilePosRow($arPos) { $this->_startFilePos = $arPos['pos']; $this->_startFileRow = $arPos['ro...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Shared/File.php Size: 5.19 kB Created: 2022-12-20 15:48:10 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 471b95ee Line: 174 Dangerous Malware Signature (hash: 471b95ee) |
Suhosin
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Shared/OLERead.php Size: 9.40 kB Created: 2022-12-20 15:48:10 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit hacked_by Line: 306 Dangerous Hacker credits |
Hacked by
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/PHPExcel/PHPExcel/Shared/PCLZip/pclzip.lib.php Size: 198.15 kB Created: 2022-12-20 15:48:50 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 963e968a Line: 5683 Dangerous Malware Signature (hash: 963e968a) |
php_uname()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/lib/zip_archive.php Size: 26.72 kB Created: 2025-02-10 09:54:47 Modified: 2025-02-10 09:54:47 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('unzip "'.$pFilename.'" -d '.$this->tmpDir); if(count(array_diff(scandir($this->tmpDir), array('.', '..')))==0) { $this->setCheckSum(); return true; } } } return false; } public function setCheckSum() { $sum = $this->calcCheckSum(); file_put_contents($this->tmpDir.'/.checksum', $sum); } public function getCheckSum() { if(!file_exists($this->tmpDir.'/.checksum')) return ''; return file_get_contents($this->tmpDir.'/.checksum'); } public function calcCheckSum($dir='') { if(strlen($dir)==0) $di...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/admin/iblock_import_excel_field_settings.php Size: 91.71 kB Created: 2022-12-20 15:48:50 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('$arFieldsParamsInArray = &$P'.$fNameEval.';'); $arFieldsParamsInArray = $arFieldParams; } if($_POST['action']) define('PUBLIC_AJAX_MODE', 'Y'); if($_POST['action']=='export_conv_csv') { $arExtra = array(); \CKDAImportExtrasettings::HandleParams($arExtra, array(array(array('CONVERSION'=>$_POST['CONVERSION'], 'EXTRA_CONVERSION'=>$_POST['EXTRA_CONVERSION']))), false); while(is_array($arExtra) && isset($arExtra[0])) $arExtra = $arExtra[0]; $arConv = $arExtraConv = array(); if(is_array($arExtra...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/admin/iblock_import_excel_field_settings_highload.php Size: 36.70 kB Created: 2022-12-20 15:48:46 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('$arFieldsParamsInArray = &$P'.$fNameEval.';'); $arFieldsParamsInArray = $arFieldParams; } if($_POST['action']) define('PUBLIC_AJAX_MODE', 'Y'); if($_POST['action']=='save' && is_array($_POST['EXTRASETTINGS'])) { $APPLICATION->RestartBuffer(); ob_end_clean(); CKDAImportExtrasettings::HandleParams($PEXTRASETTINGS, $_POST['EXTRASETTINGS']); preg_match_all('/\[([_\d]+[_P\d]*)\]/', $fieldName, $keys); $oid = 'field_settings_'.$keys[1][0].'_'.$keys[1][1]; if($_GET['return_data']) { $returnJson =...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/kda.importexcel/admin/iblock_import_excel_cron_settings.php Size: 18.78 kB Created: 2022-12-20 15:48:52 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($phpPath.' -v', $arPhpLines); if(is_array($arPhpLines) && isset($arPhpLines[0]) && preg_match('/PHP\s*([\d\.]+)/i', $arPhpLines[0], $m)) { $res = $m[1]; if(preg_match('/PHP\s*([\d\.]+)\s*\(([^\)]+)\)/i', $arPhpLines[0], $m)) { $res .= '|'.$m[2]; } } } echo $res; die(); } if(!defined('NO_AGENT_CHECK')) define('NO_AGENT_CHECK', true); $docRoot = rtrim($_SERVER["DOCUMENT_ROOT"], '/'); require_once($docRoot."/bitrix/modules/main/include/prolog_admin_before.php"); $moduleId = 'kda.importexcel'; ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/gorillas.dadata/lang/en/install/index.php Size: 1.88 kB Created: 2024-06-18 11:55:14 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/gorillas.dadata/lang/ru/install/index.php Size: 1.88 kB Created: 2024-06-18 11:55:14 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/asd.iblock/classes/general/iblock_action.php Size: 38.10 kB Created: 2022-12-02 21:29:18 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit download_remote_code2 Line: 50 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($hdlOutput, CASDiblockTools::ExportPropsToXML($BID, $_REQUEST['p'])
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/ram.watermark/classes/image.php Size: 26.31 kB Created: 2024-07-25 11:51:46 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec("which jpegtran"))) { exec("jpegtran -progressive -copy none -optimize -outfile ".$destination." ".$destination); } else if (strlen(exec("which jpegoptim"))) { exec("jpegoptim ".$destination." -q --strip-all -–all-progressive"); } break; } case "image/png": { if (strlen(exec("which optipng"))) { exec("optipng -o2 -strip all ".$destination); } break; } case "image/webp": { if (strlen(exec("which cwebp"))) { exec("cwebp -lossless ".$destination." -o ".$destination); } break; } } } } public ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/forum/install/components/bitrix/forum.rules/lang/en/component.php Size: 4.71 kB Created: 2022-12-02 21:29:20 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 407651f7 Line: 27 Dangerous Malware Signature (hash: 407651f7) |
warez
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/tinkoff.payment/install/sale_payment/tinkoff/lang/en/.description.php Size: 5.72 kB Created: 2022-12-26 13:23:38 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system(usn_income)'; $MESS['SALE_TINKOFF_TAXATION_USN_IMCOME_OUTCOME'] = 'Simplified taxation system(usn_income_outcome)'; $MESS['SALE_TINKOFF_TAXATION_ENVD'] = 'Unified tax of imputed income(envd)'; $MESS['SALE_TINKOFF_TAXATION_ESN'] = 'Unified agricultural tax(esn)'; $MESS['SALE_TINKOFF_TAXATION_PATENT'] = 'Patent system of taxation(patent)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/tinkoff.payment/install/sale_payment/tinkoff/lang/en/result.php Size: 5.54 kB Created: 2022-12-26 13:23:38 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system(usn_income)'; $MESS['SALE_TINKOFF_TAXATION_USN_IMCOME_OUTCOME'] = 'Simplified taxation system(usn_income_outcome)'; $MESS['SALE_TINKOFF_TAXATION_ENVD'] = 'Unified tax of imputed income(envd)'; $MESS['SALE_TINKOFF_TAXATION_ESN'] = 'Unified agricultural tax(esn)'; $MESS['SALE_TINKOFF_TAXATION_PATENT'] = 'Patent system of taxation(patent)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/tinkoff.payment/install/sale_payment/tinkoff/en/tinkoff.php Size: 3.60 kB Created: 2022-12-26 13:23:38 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system(usn_income)'; $MESS['SALE_TINKOFF_TAXATION_USN_IMCOME_OUTCOME'] = 'Simplified taxation system(usn_income_outcome)'; $MESS['SALE_TINKOFF_TAXATION_ENVD'] = 'Unified tax of imputed income(envd)'; $MESS['SALE_TINKOFF_TAXATION_ESN'] = 'Unified agricultural tax(esn)'; $MESS['SALE_TINKOFF_TAXATION_PATENT'] = 'Patent system of taxation(patent)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/form/classes/general/form_callformoutput.php Size: 33.80 kB Created: 2022-12-02 21:29:22 Modified: 2025-02-10 08:08:45 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('?>'.$this->__cache_tpl.'<?'); $strReturn = ob_get_contents(); ob_end_clean(); return $strReturn; } else { return false; } } function IncludeFormTemplate() { global $APPLICATION; if ($this->__check_form_cache()) { $APPLICATION->SetTemplateCSS("form/form.css"); $FORM =& $this; eval($this->__cache_tpl); return true; } else { return false; } } function isStatisticIncluded() { return CModule::IncludeModule("statistic"); } function __check_form_cache() { global $CACHE_MANAGER; if ($this->arForm[...
| Sign 11413268 Line: 100 Dangerous Malware Signature (hash: 11413268) |
eval('?>
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/form/options.php Size: 17.64 kB Created: 2022-12-02 21:29:22 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(data.URL); if (!res) { var proto = data.URL.match(/\.bitrix24\./) ? 'https' : 'http';
data.URL = proto + '://' + data.URL; res = r.exec(data.URL); }
if (res) { data.URL_SERVER = res[1]+'://'+res[2]; data.URL_PATH = res[3]; } }
if (!data.AUTH_HASH) { var content = '<div class="form-crm-settings"><form name="form_'+popup_id+'"><table cellpadding="0" cellspacing="2" border="0"><tr><td align="right"><?=CUtil::JSEscape(GetMessage('FORM_TAB_CRM_ROW_TITLE'))?>:</...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/form/admin/form_field_edit.php Size: 29.21 kB Created: 2022-12-02 21:29:22 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('function() {FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();}'); arInputs[i].onchange = new Function('FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();'); }
if (new_name == 'MESSAGE_' + (rows_count+1)) { arInputs[i].onchange = jsFormValidatorSettings.UpdateAll; } }
var input1 = BX.create('INPUT', { props: { type: 'hidden', name: 'ANSWER[]', value: rows_count + 1 } }), input2 = BX.create('...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/fileman/classes/general/editor_utils.php Size: 8.42 kB Created: 2022-12-02 21:29:24 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($code); echo '#BX_RENDERED_COMPONENT#'; $s = ob_get_contents(); ob_end_clean(); return $s; } public static function _RenderAllComponents($arParams, $bLPA) { global $APPLICATION, $USER; $s = ''; $arPHP = PHPParser::ParseFile($arParams['source']); $l = count($arPHP); if ($l > 0) { $new_source = ''; $end = 0; $comp_count = 0; ob_start(); for ($n = 0; $n<$l; $n++) { $src = $arPHP[$n][2]; if (mb_substr($src, 0, 5) == "<?"."php") $src = mb_substr($src, 5); else $src = mb_substr($src, 2); $src = m...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/fileman/admin/fileman_admin.php Size: 51.08 kB Created: 2022-12-02 21:29:26 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function posix_getpwuid Warning Potentially dangerous function `posix_getpwuid` [https://www.php.net/posix_getpwuid] |
posix_getpwuid(fileowner($fnameConverted)); $arrFileGroup = posix_getgrgid(filegroup($fnameConverted)); $showField .= " ".$arrFileOwner['name']." ".$arrFileGroup['name']; } } else $showField = " "; } $row->AddField("PERMS", $showField); } $showField = ""; if (in_array("PERMS_B", $arVisibleColumns)) { $showField = " "; if(($USER->CanDoOperation('fileman_view_permissions') || $USER->CanDoOperation('fileman_edit_all_settings')) && $USER->CanDoFileOperation('fm_view_permission', $arPath)) ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/learning/admin/learn_unilesson_edit.php Size: 48.84 kB Created: 2022-12-02 21:29:28 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('JSConfig = ' + b4); } catch (e) { JSConfig = false; } if (!id || !JSConfig) return '';
var w = (parseInt(JSConfig.width) || 50); var h = (parseInt(JSConfig.height) || 25);
var arTagParams = {file: JSConfig.file}; var bxTag = pMainObj.GetBxTag(id);
if (bxTag && bxTag && bxTag.tag == "media") { arTagParams.id = id; } return '<img id="' + pMainObj.SetBxTag(false, {tag: 'media', params: arTagParams}) + '" src="/bitrix/images/1.gif" style="border: 1px sol...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/learning/admin/learn_question_edit.php Size: 38.88 kB Created: 2022-12-02 21:29:28 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('JSConfig = ' + b4); } catch (e) { JSConfig = false; } if (!id || !JSConfig) return '';
var w = (parseInt(JSConfig.width) || 50); var h = (parseInt(JSConfig.height) || 25);
var arTagParams = {file: JSConfig.file}; var bxTag = pMainObj.GetBxTag(id);
if (bxTag && bxTag && bxTag.tag == "media") { arTagParams.id = id; } return '<img id="' + pMainObj.SetBxTag(false, {tag: 'media', params: arTagParams}) + '" src="/bitrix/images/1.gif" style="border: 1px sol...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php Size: 9.56 kB Created: 2022-12-02 21:29:28 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("var result = " + data + "; "); } if (result['status'] == 'inprogress') { document.getElementById('photogallery_recalc').innerHTML = result['text']; if (__this_source.bReady == false) { document.getElementById('ButtonPhotoGalleryRecalcStart').disabled = false; document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled = false; document.getElementById('ButtonPhotoGalleryRecalcStop').disabled = true; } else { document.getElementById(...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list/templates/slider_big/template.php Size: 16.21 kB Created: 2022-12-02 21:29:28 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Line: 337 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" + res[ii].href + "');};"); res[ii].parentNode.insertBefore(div, res[ii]); res[ii].onmouseover = function() { this.previousSibling.onshow(); this.bxMouseOver = 'Y'; }; res[ii].onmouseout = function() { this.bxMouseOver = 'N'; var __this = this; setTimeout( function() { if (__this.previousSibling && __this.previousSibling.bxMouseOver != "Y") { __this.previousSibling...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php Size: 12.71 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Exploit infected_comment Line: 110 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*width*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/perfmon/admin/perfmon_row_edit.php Size: 18.78 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ".$tokens[$pos][1].";"); $pos++; } elseif ($tokens[$pos][0] === T_LNUMBER || $tokens[$pos][0] === T_DNUMBER || $tokens[$pos][0] === T_CONSTANT_ENCAPSED_STRING) { $result = eval("return ".$tokens[$pos][1].";"); $pos++; } elseif ($tokens[$pos][0] === T_ARRAY) { $pos++; while (isset($tokens[$pos]) && $tokens[$pos][0] === T_WHITESPACE) $pos++; if ($tokens[$pos][0] !== "(") return; else $pos++; $result = array(); while (true) { while (isset($tokens[$pos]) && $tokens[$pos][0] === T_WHITES...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/perfmon/admin/perfmon_db_server.php Size: 31.58 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/b24connector/install/components/bitrix/b24connector.button.list/ajax.php Size: 4.51 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { $this->request = Context::getCurrent()->getRequest(); $this->action = $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse(); } } $controller = new B24CButtonListAjaxController(); $controller->exec()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/clouds/admin/clouds_file_list.php Size: 36.67 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 236 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/admin/expansio_generator/modules/phpmorphy-0.3.7/utils/libs/decorator.php Size: 6.79 kB Created: 2024-09-17 11:33:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($this->_createClassCode() . " return true;"); } protected function _createClassCode() { $implements = ''; $interfaces = lmbReflectionHelper :: getInterfaces($this->_class); if(function_exists('spl_classes')) $interfaces = array_diff($interfaces, array('Traversable')); if(count($interfaces) > 0) $implements = 'implements ' . implode(', ', $interfaces); $code = "class " . $this->_decorator_class . " extends " . $this->_decorator_base . " $implements {\n"; $code .= " function __construct(\$...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/admin/expansio_generator/modules/phpmorphy-0.3.7/bin/build_dict.php Size: 4.81 kB Created: 2024-09-17 11:33:30 Modified: 2025-02-10 08:08:45 Warns: 2
Description | Match |
---|
Function proc_close Warning Potentially dangerous function `proc_close` [https://www.php.net/proc_close] |
proc_close($handle); if($errorcode) { doError( "\n\nCommand '" . $cmd .'\' exit with code = ' . $errorcode . ', error = \'' . $stderr . '\'' ); } echo "OK.\n"; } function get_locale($xml) { $reader = new XMLReader(); if(false === $reader->open($xml)) { return false; } while($reader->read()) { if($reader->nodeType == XMLReader::ELEMENT) { if($reader->localName === 'locale') { $result = $reader->getAttribute('name'); $result = strlen($result) ? $result : false; break; } } } $reader->close(); retur...
| Function proc_open Warning Potentially dangerous function `proc_open` [https://www.php.net/proc_open] |
proc_open($cmd, $desc, $pipes, null, null, $opts))) { doError('Can`t execute \'' . $cmd . '\' command'); } if(1) { while(!feof($pipes[1])) { fputs(STDOUT, fgets($pipes[1])); } } else { stream_copy_to_stream($pipes[1], STDOUT); } $stderr = trim(stream_get_contents($pipes[2])); fclose($pipes[1]); fclose($pipes[2]); $errorcode = proc_close($handle); if($errorcode) { doError( "\n\nCommand '" . $cmd .'\' exit with code = ' . $errorcode . ', error = \'' . $stderr . '\'' ); } echo "OK.\n"; } function g...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/modules/phpmorphy-0.3.7/utils/libs/decorator.php Size: 6.79 kB Created: 2024-09-17 11:34:20 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($this->_createClassCode() . " return true;"); } protected function _createClassCode() { $implements = ''; $interfaces = lmbReflectionHelper :: getInterfaces($this->_class); if(function_exists('spl_classes')) $interfaces = array_diff($interfaces, array('Traversable')); if(count($interfaces) > 0) $implements = 'implements ' . implode(', ', $interfaces); $code = "class " . $this->_decorator_class . " extends " . $this->_decorator_base . " $implements {\n"; $code .= " function __construct(\$...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/expansio.generator/modules/phpmorphy-0.3.7/bin/build_dict.php Size: 4.81 kB Created: 2024-09-17 11:34:20 Modified: 2025-02-10 08:08:45 Warns: 2
Description | Match |
---|
Function proc_close Warning Potentially dangerous function `proc_close` [https://www.php.net/proc_close] |
proc_close($handle); if($errorcode) { doError( "\n\nCommand '" . $cmd .'\' exit with code = ' . $errorcode . ', error = \'' . $stderr . '\'' ); } echo "OK.\n"; } function get_locale($xml) { $reader = new XMLReader(); if(false === $reader->open($xml)) { return false; } while($reader->read()) { if($reader->nodeType == XMLReader::ELEMENT) { if($reader->localName === 'locale') { $result = $reader->getAttribute('name'); $result = strlen($result) ? $result : false; break; } } } $reader->close(); retur...
| Function proc_open Warning Potentially dangerous function `proc_open` [https://www.php.net/proc_open] |
proc_open($cmd, $desc, $pipes, null, null, $opts))) { doError('Can`t execute \'' . $cmd . '\' command'); } if(1) { while(!feof($pipes[1])) { fputs(STDOUT, fgets($pipes[1])); } } else { stream_copy_to_stream($pipes[1], STDOUT); } $stderr = trim(stream_get_contents($pipes[2])); fclose($pipes[1]); fclose($pipes[2]); $errorcode = proc_close($handle); if($errorcode) { doError( "\n\nCommand '" . $cmd .'\' exit with code = ' . $errorcode . ', error = \'' . $stderr . '\'' ); } echo "OK.\n"; } function g...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/actionmodifyer.php Size: 4.10 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 2
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/helper.php Size: 5.30 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 2
Description | Match |
---|
Exploit php_uname Line: 211 Dangerous RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine |
php_uname('s')
| Function strrev exec_strrev Line: 186 Dangerous Encoded Function `exec` [https://www.php.net/exec] |
cExe
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/action.php Size: 7.27 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($paramCode); $retStr = str_replace('##CODE_PARAMS:'.$paramId.'##', $res, $retStr); } } foreach ($this->freeParams as $key => $paramValue) $retStr = str_replace('##'.$key.'##', $paramValue, $retStr); return $retStr; } public function start(array $inputParams = array()) { if(!is_array($inputParams)) throw new \Bitrix\Main\ArgumentTypeException("inputParams", "array"); if(isset($this->actionParams["MODIFYERS"]) && is_array($this->actionParams["MODIFYERS"])) { $needMoreUserInfo = false; foreach...
| Function strrev exec_strrev Line: 179 Dangerous Encoded Function `exec` [https://www.php.net/exec] |
cExe
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/shelladapter.php Size: 1.88 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 3 Dangers: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($command. " > ".$outputPath." 2>&1 &"); return true; } public function getLastOutput() { return $this->resOutput; } public function getLastError() { return $this->resError; } public function syncExec($command) { $command = $this->prepareExecution($command); $retVal = 1; $descriptorspec = array( 0 => array("pipe", "r"), 1 => array("pipe", "w"), 2 => array("pipe", "w") ); $pipes = array(); $process = proc_open('/bin/bash', $descriptorspec, $pipes); if (is_resource($process)) { fwrite($pipes[0...
| Function proc_close Line: 93 Warning Potentially dangerous function `proc_close` [https://www.php.net/proc_close] |
proc_close($process)
| Function proc_open Warning Potentially dangerous function `proc_open` [https://www.php.net/proc_open] |
proc_open('/bin/bash', $descriptorspec, $pipes); if (is_resource($process)) { fwrite($pipes[0], $command); fclose($pipes[0]); $this->resOutput = stream_get_contents($pipes[1]); fclose($pipes[1]); $this->resError = stream_get_contents($pipes[2]); fclose($pipes[2]); $retVal = proc_close($process)
| Function strrev exec_strrev Line: 39 Dangerous Encoded Function `exec` [https://www.php.net/exec] |
cExe
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/monitoring.php Size: 14.80 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/serversdata.php Size: 5.19 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/provider.php Size: 6.34 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/sitesdata.php Size: 3.12 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lib/actionsdata.php Size: 8.27 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ('{$operand1}' {$operator} '{$operand2}');"); } public static function setLogLevel($logLevel) { self::$logLevel = $logLevel; } public static function checkRunningAction() { $result = []; $shellAdapter = new ShellAdapter(); $execRes = $shellAdapter->syncExec("sudo -u root /opt/webdir/bin/bx-process -a list -o json"); $data = $shellAdapter->getLastOutput(); if($execRes) { $arData = json_decode($data, true); $result = []; if(isset($arData["params"]) && is_array($arData["params"])) { fo...
| Function strrev exec_strrev Line: 93 Dangerous Encoded Function `exec` [https://www.php.net/exec] |
cExe
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lang/en/include/actionsdefinitions.php Size: 4.46 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/lang/ru/include/actionsdefinitions.php Size: 5.86 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/include/actionsdefinitions.php Size: 20.57 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 2
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/include/rolesdefinitions.php Size: 2.59 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 2
|
/home/web/web/vsavto.com/public_html/bitrix/modules/scale/admin/menu.php Size: 1.16 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Dangers: 1
Description | Match |
---|
Exploit php_uname Line: 13 Dangerous RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine |
php_uname('s')
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/classes/general/documentservice.php Size: 41.53 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("v = " + v);
return v; }
$objectName.GetFieldInputControl4Type = function(type, value, name, subtypeFunctionName, func) { this.GetFieldInputControlInternal( type, value, name, function(v) { var p = v.indexOf('<!--__defaultOptionsValue:'); if (p >= 0) { p = p + '<!--__defaultOptionsValue:'.length; var p1 = v.indexOf('-->', p); type['Options'] = v.substring(p, p1); }
var newPromt = "";
p = v.indexOf('<!--__modifyOptionsPromt:'); if (p >= 0) ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/classes/general/virtualdocument.php Size: 66.80 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(this.arUserTypes[type.substr(2)] + "(\"" + field + "\", \"" + value + "\")"); //} else // type == "S" { s += '<input type="text" size="40" id="id_' + field + '" name="' + inputName + '" value="' + this.HtmlSpecialChars(value) + '">'; }
if (bAddSelection) s += '<br /><input type="text" id="id_' + field + '" name="' + inputName + '" value="' + this.HtmlSpecialChars(value) + '">';
if (bAddButton && showAddButton) s += '<input type="button" value="..." onclick="B...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/classes/general/runtime.php Size: 25.48 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('class CBP'.static::REST_ACTIVITY_PREFIX.$code.' extends CBPRestActivity {const REST_ACTIVITY_ID = '.($activity? $activity['ID'] : 0).';}'); $this->loadedActivities[] = static::REST_ACTIVITY_PREFIX.$code; return true; } return false; } public function getActivityDescription($code, $lang = false) { if (preg_match("#[^a-zA-Z0-9_]#", $code)) return null; if ($code == '') return null; $code = mb_strtolower($code); if (mb_substr($code, 0, 3) == "cbp") $code = mb_substr($code, 3); if ($code == ''...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/install/activities/bitrix/codecondition/codecondition.php Size: 1.87 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1 Dangers: 2
Description | Match |
---|
Exploit silenced_eval Line: 19 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval("\$result = ".$this->condition.";")
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("\$result = ".$this->condition.";"); return $result; } public static function ValidateProperties($value = null, CBPWorkflowTemplateUser $user = null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = [ 'code' => 'perm', 'message' => GetMessage('BPCC_NO_PERMS'), ]; } return array_merge($arErrors, parent::ValidateProperties($value, $user)); } public static function GetPropertiesDialog( $documentType, $arWorkflowTemplate, $arWorkflowParameters, $arWorkflowVariables...
| Sign 696317c4 Line: 19 Dangerous Malware Signature (hash: 696317c4) |
@eval("\
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bizproc/install/activities/bitrix/codeactivity/codeactivity.php Size: 2.44 kB Created: 2022-12-02 21:29:30 Modified: 2025-02-10 08:08:45 Warns: 1 Dangers: 1
Description | Match |
---|
Exploit silenced_eval Line: 16 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval($this->ExecuteCode)
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($this->ExecuteCode); return CBPActivityExecutionStatus::Closed; } public static function ValidateProperties($arTestProperties = array(), CBPWorkflowTemplateUser $user = null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = array( "code" => "perm", "message" => GetMessage("BPCA_NO_PERMS"), ); } if ($arTestProperties["ExecuteCode"] == '') { $arErrors[] = array( "code" => "emptyCode", "message" => GetMessage("BPCA_EMPTY_CODE"), ); } return array_merge($arErrors, ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/interface/admin_list.php Size: 46.25 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(this.form.action[this.form.action.selectedIndex].getAttribute('custom_action'));return false;}" disabled="disabled" class="adm-table-action-button" /> <? endif; ?> <span class="adm-table-counter" id="<?=$this->table_id?>_selected_count"><?=GetMessage('admin_lib_checked')?>: <span>0</span></span> <? endif; ?> </div> <? } public function DisplayList($arParams = array()) { $menu = new CAdminPopup($this->table_id."_menu", $this->table_id."_menu"); $menu->Show(); if ($this->isAjaxDebug()) { ech...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/public/menu_edit.php Size: 21.31 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(\''.$out.'\');'; ?>
var arCellsHTML = [ '<span class="rowcontrol drag" title="<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_DRAG'))?>"></span>', getAreaHTML('text_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_TEXT_EDIT'))?>'), getAreaHTML('link_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_LINK_EDIT'))?>'), '<span onclick="if (!GLOBAL_bDisableActions) {currentLink = \'' + nums + '\'; OpenFileBrowserWindFile_' + nums + '();}" class="rowcontrol...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_client.php Size: 257.47 kB Created: 2022-12-26 11:32:44 Modified: 2025-02-10 08:08:46 Warns: 2 Dangers: 15
Description | Match |
---|
Exploit infected_comment Line: 1 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*PATCH*/
| Exploit silenced_eval Line: 1 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval($GLOBALS['____9471607'][885](array('<?php', '<?', '?>')
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($_808017524); else $_1828906802= ___159488183(134);} catch(Exception $_1224328102){ $_1828906802= ___159488183(135).$_1224328102->getCode().___159488183(136).$_1224328102->getMessage();} $_482517401 .= ___159488183(137).$GLOBALS['____9471607'][51]($_327810548[___159488183(138)][___159488183(139)]).___159488183(140).$GLOBALS['____9471607'][52]($_1828906802);}} if(empty($_547990182)){ CUpdateClient::AddMessage2Log($GLOBALS['____9471607'][53](___159488183(141), ___159488183(142), $_482517401))...
| Sign 34b7e999 Line: 1 Dangerous Malware Signature (hash: 34b7e999) |
dMT0JBTF
| Sign 7186bb8d Line: 1 Dangerous Malware Signature (hash: 7186bb8d) |
RlZmluZ
| Sign 7830f7a6 Line: 1 Dangerous Malware Signature (hash: 7830f7a6) |
N5c3Rlb
| Sign 7f5d33bf Line: 1 Dangerous Malware Signature (hash: 7f5d33bf) |
JlcGxhY2
| Sign 91535293 Line: 1 Dangerous Malware Signature (hash: 91535293) |
luY2x1ZG
| Sign 963e968a Line: 1 Dangerous Malware Signature (hash: 963e968a) |
pbmNsdWRl
| Sign 99fc3b9d Line: 1 Dangerous Malware Signature (hash: 99fc3b9d) |
$GLOBALS['____
| Sign a408f408 Line: 1 Dangerous Malware Signature (hash: a408f408) |
c3RyX
| Sign ae7830db Line: 1 Dangerous Malware Signature (hash: ae7830db) |
YXJyYXlf
| Sign d30fc49e Line: 1 Dangerous Malware Signature (hash: d30fc49e) |
b3Blb
| Sign d97f004d Line: 1 Dangerous Malware Signature (hash: d97f004d) |
ZXhlYy
| Sign de12c454 Line: 1 Dangerous Malware Signature (hash: de12c454) |
vcGVu
| Sign ee1cb326 Line: 1 Dangerous Malware Signature (hash: ee1cb326) |
9wZW
| Sign f9dc0a55 Dangerous Malware Signature (hash: f9dc0a55) |
'base64_decode'
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/controller_member.php Size: 41.54 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($disconnect_command); COption::SetOptionString("main", "controller_member", "N"); } public static function GetBackup($bRefresh = false) { static $arCachedData; if(!isset($arCachedData) || $bRefresh) $arCachedData = unserialize(COption::GetOptionString("main", "~controller_backup", ""), ['allowed_classes' => false]); return $arCachedData; } public static function SetBackup($arBackup) { COption::SetOptionString("main", "~controller_backup", serialize($arBackup)); CControllerClient::GetBackup(...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/site_checker.php Size: 92.20 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 2
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('catdoc -V', $output, $return_var); if ($return_var === 0) { $version = $output[0]; if (strpos($version, '0.94.4') !== false || strpos($version, '0.94.3') !== false) $strError .= GetMessage('MAIN_CATDOC_WARN', array('#VERSION#' => $version)); } } return $this->Result(false, $strError); } function check_fast_download() { $tmp = $_SERVER['DOCUMENT_ROOT'].'/bitrix/tmp/success.txt'; if (!CheckDirPath($tmp) || !file_put_contents($tmp, 'SUCCESS')) return $this->Result(false, GetMessage("MAIN_TMP_...
| Sign 471b95ee Line: 553 Dangerous Malware Signature (hash: 471b95ee) |
suhosin
| Sign 471b95ee Line: 555 Dangerous Malware Signature (hash: 471b95ee) |
SUHOSIN
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/vuln_scanner.php Size: 64.49 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign f9dc0a55 Line: 1969 Dangerous Malware Signature (hash: f9dc0a55) |
'base64_decode'
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/menu.php Size: 15.60 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ".$CONDITION.";"))) $bSkipMenuItem = true; } if(!$bSkipMenuItem) $ITEM_INDEX++; if(($pos = mb_strpos($LINK, "?"))!==false) $ITEM_TYPE = "U"; elseif(mb_substr($LINK, -1) == "/") $ITEM_TYPE = "D"; else $ITEM_TYPE = "P"; $SELECTED = false; if($bCached) { $all_links = $arMenuCache[$iMenuItem]["LINKS"]; if(!is_array($all_links)) $all_links = array(); } else { $all_links = array(); if(is_array($ADDITIONAL_LINKS)) { foreach($ADDITIONAL_LINKS as $link) { $tested_link = trim(Rel2Abs($this->M...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_list.php Size: 1.20 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("parent."+this.name+"_"+str); } catch(e){} } </script>
</head> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0" bgcolor="white">
<table width="100%" border="0" id="updates_items"> </table>
</body> </html> <? require($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/site.php Size: 26.03 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Exploit silenced_eval Line: 883 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval("return ".$strCondition.";")
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ".$strCondition.";"))) { continue; } if(($path = getLocalPath("templates/".$ar["TEMPLATE"], BX_PERSONAL_ROOT)) !== false && is_dir($_SERVER["DOCUMENT_ROOT"].$path)) { $siteTemplate = $ar["TEMPLATE"]; break; } } } else { if($CACHE_MANAGER->Read(CACHED_b_site_template, "b_site_template")) { $arSiteTemplateBySite = $CACHE_MANAGER->Get("b_site_template"); } else { $dbr = $connection->query("
SELECT
".$conditionQuoted.",
TEMPLATE,
SITE_ID
FROM
b_si...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_client_partner.php Size: 74.87 kB Created: 2022-12-26 11:32:44 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Exploit infected_comment Line: 1079 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*PATCH*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/zip.php Size: 66.39 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('$res = '.$arParams['callback_pre_add'].'(\'callback_pre_add\', $arLocalHeader);'); if ($res == 0) { $arHeader['status'] = "skipped"; $res = 1; } if ($arHeader['stored_filename'] != $arLocalHeader['stored_filename']) { $arHeader['stored_filename'] = $this->_reducePath($arLocalHeader['stored_filename']); } } if ($arHeader['stored_filename'] == "") { $arHeader['status'] = "filtered"; } if (mb_strlen($arHeader['stored_filename']) > 0xFF) { $arHeader['status'] = 'filename_too_long'; } if ($arHe...
| Sign 963e968a Line: 2567 Dangerous Malware Signature (hash: 963e968a) |
php_uname()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_class.php Size: 151.28 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 2
Description | Match |
---|
Exploit silenced_eval Line: 3274 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\")
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\"),(\$order=\"\"),array(\"ACTIVE\"=>\"Y\"));\$cnt=0;while(\$ar_"."res=\$path->Fe"."tch())\$cnt++;"); return $cnt;} } public static function GetModuleVersion($module) { if ($module == '') return false; $strModule_tmp_dir = $_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module; if (file_exists($strModule_tmp_dir) && is_dir($strModule_tmp_dir)) { if ($module != "main") { if (file_exists($strModule_tmp_dir."/install/index.php")) { $arModule_tmp_i...
| Sign 696317c4 Line: 3274 Dangerous Malware Signature (hash: 696317c4) |
@eval("\
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/database.php Size: 32.31 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/main.php Size: 92.09 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("?>".$fTmp->GetContents()); } $FILE_PERM = $PERM[$path_file]; if(!is_array($FILE_PERM)) $FILE_PERM = array(); if(!$bOverWrite && count($FILE_PERM)>0) return true; $bDiff = false; $str="<?\n"; foreach($arPermissions as $group=>$perm) { if($perm <> '') $str .= "\$PERM[\"".EscapePHPString($path_file)."\"][\"".EscapePHPString($group)."\"]=\"".EscapePHPString($perm)."\";\n"; if(!$bDiff) { $curr_perm = $FILE_PERM[$group]; if(!isset($curr_perm) && preg_match('/^G[0-9]+$/', $group)) $curr_perm = $F...
| Sign 11413268 Line: 1600 Dangerous Malware Signature (hash: 11413268) |
eval("?>
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_update.php Size: 89.67 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("DescrDetList_"+sModule)); wnd.document.write('</font>'); wnd.document.write('\n</body></html>'); } //--> </script>
<table border="0" cellspacing="1" cellpadding="2" width="99%"> <tr> <td align="center" class="tablehead1"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DATE") ?></font></td> <td align="center" class="tablehead2"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DESCR") ?></font></td> <td align="center" class="tablehead3"><font class="tablehe...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/update_b24.php Size: 12.22 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function syslog Warning Potentially dangerous function `syslog` [https://www.php.net/syslog] |
syslog(LOG_INFO, $_SERVER["HTTP_HOST"]."\tstart\t".$moduleId.$arUpdaters[$i1][0]); CUpdateClient::RunUpdaterScript($this->updatersDir.$moduleId.$arUpdaters[$i1][0], $errorMessageTmp, "", $moduleId); syslog(LOG_INFO, $_SERVER["HTTP_HOST"]."\tend\t".$moduleId.$arUpdaters[$i1][0]."\t".$errorMessageTmp); if ($errorMessageTmp <> '') { $errorMessage .= str_replace("#MODULE#", $moduleId, str_replace("#VER#", $arUpdaters[$i1][1], GetMessage("SUPP_UK_UPDN_ERR"))).": ".$errorMessageTmp."."; } $this->Colle...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/general/jscore.php Size: 16.43 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(ua) != null) { rv = parseFloat(RegExp.$1); } } else if (n.appName == "Netscape") { rv = 11; re = new RegExp("Trident/.*rv:([0-9]+[\.0-9]*)"); if (re.exec(ua) != null) { rv = parseFloat(RegExp.$1); } } }
return rv; }
})(window, document, navigator); JS; return '<script type="text/javascript" data-skip-moving="true">'.str_replace(array("\n", "\t"), "", $js)."</script>"; } public static function GetScrip...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/mysql/database.php Size: 23.54 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/classes/mysql/agent.php Size: 5.21 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("\$eval_result=".$arAgent["NAME"]); } catch (Exception $e) { CTimeZone::Enable(); $application = \Bitrix\Main\Application::getInstance(); $exceptionHandler = $application->getExceptionHandler(); $exceptionHandler->writeToLog($e); continue; } CTimeZone::Enable(); if ($logFunction) $logFunction($arAgent, "finish", $eval_result, $e); if ($e === false) { continue; } elseif ($eval_result == '') { $strSql = "DELETE FROM b_agent WHERE ID = ".$arAgent["ID"]; } else { if ($logFunction && function_ex...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/wizard_sol/utils.php Size: 13.56 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("?>".file_get_contents($documentRoot.$pathDir."/.access.php")); } if (!isset($PERM[$pathFile]) || !is_array($PERM[$pathFile])) $arPermisson = $permissions; else $arPermisson = $permissions + $PERM[$pathFile]; return $GLOBALS["APPLICATION"]->SetFileAccessPermission($originalPath, $arPermisson); } public static function AddMenuItem($menuFile, $menuItem, $siteID, $pos = -1) { if (CModule::IncludeModule('fileman')) { $arResult = CFileMan::GetMenuArray($_SERVER["DOCUMENT_ROOT"].$menuFile); $arMe...
| Sign 11413268 Line: 324 Dangerous Malware Signature (hash: 11413268) |
eval("?>
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/profile.php Size: 28.92 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit extract_global Line: 7 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_POST, EXTR_SKIP)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/authorize_registration.php Size: 6.89 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit extract_global Line: 2 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_REQUEST, EXTR_SKIP)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/forgot_password.php Size: 2.54 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit extract_global Line: 2 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_REQUEST, EXTR_SKIP)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/authorize.php Size: 3.78 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit extract_global Line: 2 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_REQUEST, EXTR_SKIP)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/registration.php Size: 6.24 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit extract_global Line: 2 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_REQUEST, EXTR_SKIP)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/auth/change_password.php Size: 3.49 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit extract_global Line: 2 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_REQUEST, EXTR_SKIP)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/templates/main/map/default.php Size: 13.56 kB Created: 2022-12-02 21:29:40 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 2
Description | Match |
---|
Exploit extract_global Line: 14 Dangerous Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request |
extract($_REQUEST, EXTR_SKIP)
| Exploit silenced_eval Line: 220 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval("return ".$CONDITION.";")
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ".$CONDITION.";"))) continue; } if ($aMenu[1] <> '') { $search_child = true; if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i", $aMenu[1])) $full_path = $aMenu[1]; else $full_path = trim(Rel2Abs($PARENT_PATH, $aMenu[1])); } else { $search_child = false; $full_path = $PARENT_PATH; } if ($full_path <> '') { $FILE_ACCESS = (preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i", $full_path)) ? "R" : $APPLICATION->GetFileAccessPermission($full_path); if ($FILE_ACCESS!="D" && $aMen...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/bitrix/index.php Size: 83.00 B Created: 2022-12-02 21:29:48 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 0f37c730 Line: 2 Dangerous Malware Signature (hash: 0f37c730) |
meta http-equiv="REFRESH" content="0;
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/components/bitrix/main.ui.grid/templates/.default/template.php Size: 49.30 kB Created: 2022-12-02 21:29:50 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>); var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>); var Grid = BX.Main.gridManager.getById('<?=\CUtil::JSEscape($arParams["GRID_ID"])?>'); var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>); var currentPage = '<?=\CUtil::JSEscape($arParams["CURRENT_PAGE"])?>';
Grid = Grid ? Grid.instance : null;
if (Grid) { Grid.arParams.DEFAULT_COLUMNS = defaultColumns; Grid.arPa...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/components/bitrix/main.map/component.php Size: 5.84 kB Created: 2022-12-02 21:29:52 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("return ".$CONDITION.";"))) continue; } $search_child = false; $search_path = ''; $full_path = ''; if ($aMenu[1] <> '') { if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i", $aMenu[1])) { $full_path = $aMenu[1]; } else { $full_path = trim(Rel2Abs(mb_substr($PARENT_PATH, mb_strlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1])); $slash_pos = mb_strrpos($full_path, "/"); if ($slash_pos !== false) { $page = mb_substr($full_path, $slash_pos + 1); if(($pos = mb_strpos($page, '?')) !== false) $pag...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/install/wizard/wizard.php Size: 119.27 kB Created: 2022-12-02 21:29:52 Modified: 2025-02-10 08:08:46 Dangers: 2
Description | Match |
---|
Exploit download_remote_code2 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($handler, '<?require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php")
| Exploit download_remote_code2 Line: 3625 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($handler, '<'.'?require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php")
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/data/connectionpool.php Size: 6.78 kB Created: 2022-12-02 21:29:54 Modified: 2025-02-10 08:08:46 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/data/configurator/redisconnectionconfigurator.php Size: 2.87 kB Created: 2022-12-02 21:29:54 Modified: 2025-02-10 08:08:46 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/db/connection.php Size: 23.83 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/orm/query/query.php Size: 94.90 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { $this->is_executing = true; $query = $this->buildQuery(); $cacheId = ""; $ttl = 0; $result = null; if($this->cacheTtl > 0 && (empty($this->join_map) || $this->cacheJoins == true)) { $ttl = $this->entity->getCacheTtl($this->cacheTtl); } if($ttl > 0) { $cacheId = md5($query); $result = $this->entity->readFromCache($ttl, $cacheId, $this->countTotal); } if($result === null) { $result = $this->query($query); if($ttl > 0) { $result = $this->entity->writeToCache($result, $cacheId, $this->count...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/orm/entity.php Size: 31.50 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($eval); $entity = self::getInstance($entity_name); foreach ($fieldsMap as $k => $v) { $entity->addField($v, $k); } return $entity; } public static function compileEntity($entityName, $fields = null, $parameters = array()) { $classCode = ''; $classCodeEnd = ''; if (strtolower(substr($entityName, -5)) !== 'table') { $entityName .= 'Table'; } if (!preg_match('/^[a-z0-9_]+$/i', $entityName)) { throw new Main\ArgumentException(sprintf( 'Invalid entity className `%s`.', $entityName )); } $fullEnt...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/orm/annotations/annotationtrait.php Size: 20.29 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec()"; $code[] = "\t * @method {$objectClass} fetchObject()"; $code[] = "\t * @method {$collectionClass} fetchCollection()"; $code[] = "\t *"; $code[] = "\t * Custom methods:"; $code[] = "\t * ---------------"; $code[] = "\t *"; foreach (get_class_methods($dataClass) as $method) { if (substr($method, 0, 4) === 'with') { $reflectionMethod = new \ReflectionMethod($dataClass, $method); if ($reflectionMethod->isStatic()) { $arguments = []; foreach (array_slice($reflectionMethod->getParameters(), 1...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/ui/fileinputunclouder.php Size: 3.02 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($mode = "basic", $params = array()) { $res = $this->check($params); if ($this->check($params)) { $this->file = \CFile::getByID($this->id)->fetch(); if ($mode == "resize" && ($file = \CFile::ResizeImageGet($this->id, $params, BX_RESIZE_IMAGE_PROPORTIONAL, true, false, true)) && $file) { $this->file["SRC"] = $file["src"]; $this->file["WIDTH"] = $file["width"]; $this->file["HEIGHT"] = $file["height"]; $this->file["FILE_SIZE"] = $file["size"]; } \CFile::ViewByUser($this->file, array("force_down...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/ui/fileinputreceiver.php Size: 2.07 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { $this->getAgent()->checkPost()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/mail/eventmessagethemecompiler.php Size: 10.12 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('use \Bitrix\Main\Mail\EventMessageThemeCompiler; ob_start();?>' . $template . '<? return ob_get_clean();'); } catch(StopException $e) { ob_clean(); throw $e; } return $result; } protected function addReplaceCallback($identificator, $callback) { $this->replaceCallback[$identificator] = $callback; } protected function executeReplaceCallback() { $arReplaceIdentificators = array(); $arReplaceStrings = array(); foreach($this->replaceCallback as $identificator => $callback) { $result = call_user...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/diag/syslogger.php Size: 1.06 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function syslog Warning Potentially dangerous function `syslog` [https://www.php.net/syslog] |
syslog(static::$supportedLevels[$level], $message); } public static function priorityToLevel(int $priority) { static $levels = null; if ($levels === null) { $levels = array_flip(static::$supportedLevels)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lib/userconsent/internals/componentcontroller.php Size: 1.99 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { $this->request = Context::getCurrent()->getRequest(); $this->action = $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/update_client.php Size: 24.45 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (in other words, no updates may be available). If any of the module updates are available, please install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation."; $MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/general/update_client.php Size: 24.45 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (in other words, no updates may be available). If any of the module updates are available, please install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation."; $MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/general/update_update.php Size: 22.66 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (in other words, no updates may be available). If any of the module updates are available, please install it first."; $MESS["SUP_SRC_ACT_ALT"] = "Download source code"; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_SITES_PROMT"] = "You cannot create more than #NUM# site#END# using this kernel according to your license. If you need more sites, you can buy them any time. After you have purchased the additional sites, you will have to add them to the system."; $MESS["SUP_SITES_AC...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/classes/general/update_update5.php Size: 25.89 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (in other words, no updates may be available). If any of the module updates are available, please install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of wesbsites using this product installation."; $MESS["SUP_CHECK_PROMT_1"] = "You can extend your period of technical support, purchase additi...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/admin/site_checker.php Size: 51.72 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Dangers: 2
Description | Match |
---|
Sign 471b95ee Line: 396 Dangerous Malware Signature (hash: 471b95ee) |
suhosin
| Sign 471b95ee Line: 571 Dangerous Malware Signature (hash: 471b95ee) |
SUHOSIN
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/en/admin/update_system.php Size: 20.34 kB Created: 2022-12-02 21:29:56 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (in other words, no updates may be available). If any of the module updates are available, please install them first."; $MESS["SUP_SUBS_MED"] = "Downloaded source code for"; $MESS["SUP_SUBS_SOURCES"] = "Download source code"; $MESS["SUP_SUBS_SUCCESS"] = "The source code has been downloaded successfully"; $MESS["SUP_SUBS_SUPPORT"] = "System Area"; $MESS["SUP_SUBT_AGREE"] = "I accept the license agreement"; $MESS["SUP_SUBT_ERROR_LICENCE"] = "Error accepting the license agreement"; $MESS["SU...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/lang/ru/admin/site_checker.php Size: 82.02 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 471b95ee Line: 94 Dangerous Malware Signature (hash: 471b95ee) |
suhosin
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/dump_list.php Size: 15.66 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(result); PartDownload(); } CHttpRequest.Send(url); }
function PartDownload() { if (!links || links.length == 0) return;
var link = links.pop(); var iframe = document.createElement('iframe'); iframe.style.display = "none"; iframe.src = link; document.body.appendChild(iframe);
window.setTimeout(PartDownload, 10000); }
function EndDump() { } </script> <div id="dump_result_div"></div> <? $lAdmin->DisplayList(); echo BeginNote(); echo GetMessage("MAIN_DUMP_HEAD...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/site_checker.php Size: 31.12 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(result);
var oTable = BX('fix_table'); if (oRow = BX('in_progress')) { oCell = oRow.cells[1]; } else { oRow = oTable.insertRow(-1); oCell = oRow.insertCell(-1); oCell.style.width = '40%'; oCell.innerHTML = strCurrentTestName; oCell = oRow.insertCell(-1); }
if (strResult == '') { oRow.setAttribute('id', 'in_progress'); oCell.innerHTML = '<div class="sc_progress" style="width:' + test_percent + '%">' + test_percent ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/group_edit.php Size: 23.08 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("document.form1.USER_ID_FROM_" + id); var ed1 = eval("document.form1.USER_ID_TO_" + id); ed.disabled = !obj.checked; ed1.disabled = !obj.checked; } </script> <? $ind = -1; $dbUsers = CUser::GetList("id", "asc", array("ACTIVE" => "Y")); while ($arUsers = $dbUsers->Fetch()) { $ind++; ?> <tr> <td> <input type="hidden" name="USER_ID_<?=$ind?>" value="<?=$arUsers["ID"] ?>"> <input type="checkbox" name="USER_ID_ACT_<?=$ind?>" id="USER_ID_ACT_ID_<?=$ind?>"...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/checklist_detail.php Size: 15.86 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("(" +data+")"); var show_result = false; var buttons = BX.findChildren(BX('checklist-popup-tes-status'), {className:'checklist-popup-tes-status'}); if (json_data.STATUS || stoptest == true) { if (json_data.STATUS) { BX("show_detail_link").style.display = "none"; BX("detail_system_comment_<?=$jsTestID;?>").innerHTML = ""; currentStatus = json_data.STATUS; RefreshCheckList(json_data); for(var i=0; i<buttons.length; i++) BX.removeCl...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/main_controller.php Size: 8.72 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($oRequest->arParameters['join_command']); $oResponse->status = "200 OK"; } else { $oResponse->status = "472 Bad Request"; $oResponse->text = GetMessage("MAIN_ADM_CONTROLLER_ERR8"); } } elseif(!$oRequest->Check()) { $oResponse->status = "403 Access Denied"; $oResponse->text = "Access Denied"; } else { switch($oRequest->operation) { case "ping": $oResponse->status = "200 OK"; break; case "register": $ticket_id = COption::GetOptionString("main", "controller_ticket", ""); list($ticket_created, ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/dump.php Size: 46.71 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(result)) counter_sec = regs[1]; } }
function IncCounter() { window.setTimeout(IncCounter, 1000); if (!counter_started) return;
counter_sec ++; var ob; if (ob = BX('counter_field')) { var min = Math.floor(counter_sec / 60); var sec = counter_sec % 60; if (min < 10) min = '0' + min; if (sec < 10) sec = '0' + sec; ob.innerHTML = min + ':' + sec; } } window.setTimeout(IncCounter, 1000);
function GetLicenseInfo() { CHttpRequest.Action = function(result) { BX('...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/php_command_line.php Size: 11.03 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($query); ob_end_flush(); printf("<hr>".GetMessage("php_cmd_exec_time")." %0.6f", microtime(1) - $stime); } require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_js.php"); die(); } $APPLICATION->SetTitle(GetMessage("php_cmd_title")); CJSCore::Init(array('ls')); if( $_SERVER['REQUEST_METHOD'] == 'POST' && $_POST["ajax"] === "y" && (isset($_POST["add"]) || $remove) ) { CUtil::JSPostUnescape(); require_once($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_a...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/checklist.php Size: 44.57 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(<?=$arStates;?>); var DetailWindow = false; var arMainStat ={ "REQUIRE":<?=$arStat["REQUIRE"];?>, "REQUIRE_CHECK":<?=$arStat["REQUIRE_CHECK"];?>, "FAILED":<?=$arStat["FAILED"];?>, "SUCCESS":<?=$arStat["CHECK"];?>, "SUCCESS_R":<?=$arStat["CHECK_R"];?>, "TOTAL":<?=$arStat["TOTAL"];?> }; var arRequireCount=<?=$arStat["REQUIRE"];?>; var arRequireCheckCount=<?=$arStat["REQUIRE_CHECK"];?>; var arFailedCount = <?=$arStat["FAILED"];?>; var CanClose = "<?=$arCanClose;...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/checklist_report.php Size: 18.83 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Line: 305 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(<?=$arStates;?>); var Dialog = false; var current = 0; var next = 0; var prev = 0; var last_id = false; function InitState() { var el = false; for (var i=0;i<arStates["SECTIONS"].length;i++) { el = arStates["SECTIONS"][i]; if (el.CHECKED == "Y") BX.addClass(BX(el.ID+"_name"),"checklist-testlist-green"); BX(el.ID+"_stat").innerHTML = "(<span class=\"checklist-testlist-passed-test\">"+el.CHECK+"</span>/"+el.TOTAL+")"; } for (i=0;i<arStates["POINTS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/admin/userfield_edit.php Size: 18.95 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(i); if (r && r[1] > 0) { addNewRow('list_table'); } }
});
}); //--> </script> <? $formAction = $APPLICATION->GetCurPage(); $formAction = $adminSidePanelHelper->setDefaultQueryParams($formAction); ?> <form method="POST" action="<?=$formAction?>" ENCTYPE="multipart/form-data" name="post_form"> <? $tabControl->Begin(); ?> <? $tabControl->BeginNextTab(); ?> <?if($ID):?> <tr> <td width="40%">ID:</td> <td width="60%"><?=$ID?></td> </tr> <?endif?> <tr class="adm-detail-r...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/vendor/phpmailer/phpmailer/src/PHPMailer.php Size: 171.45 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign a408f408 Line: 1806 Dangerous Malware Signature (hash: a408f408) |
cmd.exe
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/main/vendor/phpmailer/phpmailer/language/phpmailer.lang-lt.php Size: 1.59 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Function str_rot13 eval_str_rot13 Line: 12 Dangerous Encoded Function `eval` [https://www.php.net/eval] |
riny
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/template/condition.php Size: 25.52 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(" return (" . trim($conditionEval) . "); "); return $result; } return true; } } class CondCtrl { const LOGIC_EQUAL = 'equal'; const LOGIC_NOT = 'not'; const LOGIC_START = 'start'; const LOGIC_END = 'end'; const LOGIC_HAS = 'has'; const LOGIC_LT = 'lt'; const LOGIC_LTE = 'lte'; const LOGIC_MT = 'mt'; const LOGIC_MTE = 'mte'; public static function getTypePrefix($name, $text) { return ['type' => 'prefix', 'name' => $name, 'text' => $text]; } public static function getTypeLogic($name, $values ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/zazumedia_ru.php Size: 16.86 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgateway24com.php Size: 10.35 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 24 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgateway24_com.php Size: 7.61 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 56 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/ibatele_com.php Size: 10.19 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/a2p_sms_https_beeline_ru.php Size: 13.85 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsbliss_ru.php Size: 14.85 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 29 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/p1sms_ru.php Size: 12.67 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 54 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/streamtelecom.php Size: 13.49 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 19 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/promosms_ru.php Size: 11.03 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/osonsms_com.php Size: 10.75 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 24 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/terasms_ru.php Size: 15.04 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 33 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_ru.php Size: 35.62 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/targetsms_ru.php Size: 15.43 kB Created: 2024-03-13 10:23:26 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms48.php Size: 12.44 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 46 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_prosto_ru.php Size: 10.87 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/prostor_sms_ru.php Size: 17.33 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/i_dgtl_ru.php Size: 13.69 kB Created: 2024-03-13 10:23:28 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 22 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_sending_ru.php Size: 14.96 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2.php Size: 10.04 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 76 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_su.php Size: 10.80 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sendpulse_com.php Size: 11.58 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 29 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms2_ru.php Size: 9.69 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/intistele_com.php Size: 12.85 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 43 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mobizon_ua.php Size: 10.31 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 34 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsint_ru.php Size: 15.28 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 45 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_fly_ua.php Size: 10.23 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 21 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/semysms_net.php Size: 9.29 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/talk_me_ru.php Size: 16.13 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 17 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/devinotele_com.php Size: 11.40 kB Created: 2024-03-13 10:23:26 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 77 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/infosmska_ru.php Size: 10.51 kB Created: 2024-03-13 10:23:28 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 54 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/pushsms_ru.php Size: 9.33 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 32 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/b2b_sms_ru.php Size: 15.54 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/redsms_ru.php Size: 11.66 kB Created: 2024-03-13 10:23:24 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 25 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/alphasms_ua.php Size: 19.08 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms4b_ru.php Size: 11.97 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/bytehand_com.php Size: 18.11 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsimple_ru.php Size: 12.75 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2_ru.php Size: 6.86 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 57 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/axtele_com.php Size: 10.25 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 52 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsy_es.php Size: 17.45 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/imobis_ru.php Size: 11.89 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 24 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_uslugi_ru.php Size: 18.48 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 24 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2_target.php Size: 12.80 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 33 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgorod_ru.php Size: 12.69 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 34 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/rocketsms_by.php Size: 10.28 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 26 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/twilio_com.php Size: 8.35 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 41 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/esputnik_ru.php Size: 10.94 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 65 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_assistent_by.php Size: 10.06 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mainsms.php Size: 16.48 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 40 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smspro_nikita_kg.php Size: 15.27 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms.php Size: 40.55 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 20 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/aramba_ru.php Size: 9.93 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 23 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/kolibrisms_ru.php Size: 8.98 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/kolibrisms.php Size: 13.15 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 104 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/kazinfoteh_kz.php Size: 13.18 kB Created: 2024-03-13 10:23:24 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/easy_sms_ru.php Size: 15.80 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 18 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsaero_ru.php Size: 9.96 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/bytehand.php Size: 21.55 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 19 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_fly_com.php Size: 17.50 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 56 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/atompark_com.php Size: 10.50 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 37 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/terasmsru.php Size: 16.63 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 85 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mirsms_ru.php Size: 11.97 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsc_ru.php Size: 18.86 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smspilot_ru.php Size: 15.58 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 21 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms48_ru.php Size: 9.63 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 24 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/webcom_mobi.php Size: 17.53 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms2ru.php Size: 11.66 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 46 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsgk_ru.php Size: 17.50 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/iqsms.php Size: 23.09 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 60 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsc.php Size: 23.10 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 58 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_by.php Size: 9.94 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 34 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsprofi.php Size: 22.87 kB Created: 2024-03-13 10:23:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 167 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/it_sms_ru.php Size: 17.49 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsis_ru.php Size: 18.91 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/megalabs_ru.php Size: 9.20 kB Created: 2024-03-13 10:23:26 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/marketolog_mts_ru.php Size: 11.52 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/qtelecom_ru.php Size: 11.45 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 14 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sigmasms_ru.php Size: 12.01 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 63 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/iqsms_ru.php Size: 10.70 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 26 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/tele2_ru_target.php Size: 9.74 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 34 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/beeline_amega_inform_ru.php Size: 8.88 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsp_by.php Size: 16.82 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 27 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/stream_telecom_ru.php Size: 9.11 kB Created: 2024-03-13 10:23:26 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 15 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/sms_agent_ru.php Size: 10.72 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 26 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/ssms_su.php Size: 10.81 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 19 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/websms_ru.php Size: 10.75 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 32 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/mainsms_ru.php Size: 10.19 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 16 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/bxmaker.smsnotice/lib/service/smsprofi_ru.php Size: 17.94 kB Created: 2024-03-13 10:23:20 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit hex_char Line: 23 Dangerous Hex char is usually used for the obfuscation of malicious code |
\x5f
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/mail/classes/general/mail.php Size: 115.42 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Exploit silenced_eval Line: 2973 Dangerous RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine |
@eval($code)
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($code); ob_end_clean(); if($php_errormsg != "") CMailError::SetError("B_MAIL_ERR_PHP", GetMessage("MAIL_CL_ERR_IN_PHP").$field_name.". (".$php_errormsg.")"); $php_errormsg = $php_errormsg_prev; ini_set("track_errors", $prev); } public static function CheckConditionTypes($fields) { if(is_set($fields, 'CONDITIONS')) { $errors = []; $whiteList = [ 'TYPE', 'STRINGS', 'COMPARE_TYPE', 'ID', 'FILTER_ID', ]; foreach ($fields['CONDITIONS'] as $item) { foreach ($item as $key => $value) { if(!in_array...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/mail/lib/helper/mailbox/imap.php Size: 54.10 kB Created: 2022-12-02 21:29:58 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 876d76e8 Line: 1374 Dangerous Malware Signature (hash: 876d76e8) |
= $fetcher(sprintf(
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/mail/admin/mail_smtpd_manager.php Size: 2.44 kB Created: 2022-12-02 21:30:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($cmd, $op); } } if ($startErrorMessage == '') $res = "success"; else $res = $startErrorMessage; break; case 'stop': $CACHE_MANAGER->Read(3600000, $cache_id = "smtpd_stop"); $CACHE_MANAGER->Set($cache_id, true); break; case 'stats': $res = false; if($CACHE_MANAGER->Read(3600000, $cache_id = "smtpd_stats")) { $res = $CACHE_MANAGER->Get($cache_id); $res["uptime"] = time() - $res["started"]; } break; } echo CUtil::PhpToJSObject($res, false); ?> <? require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/mod...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php Size: 11.35 kB Created: 2022-12-02 21:30:06 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open");
if (tagOpen == 0) { if (doInsert("[" + thetag + "]", "[/" + thetag + "]", true)) { eval(thetag + "_open = 1"); // Change the button status
pushstack(bbtags, thetag); cstat(); } } else { // Find the last occurance of the opened tag lastindex = 0;
for (i = 0 ; i < bbtags.length; i++ ) { if ( bbtags[i] == thetag ) { lastindex = i; } }
// Close all tags opened up to that tag was opened while (bbtags[lastindex]) { tagR...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php Size: 22.93 kB Created: 2022-12-02 21:30:06 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Line: 97 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open");
if (tagOpen == 0) { if (doInsert("[" + thetag + "]", "[/" + thetag + "]", true)) { eval(thetag + "_open = 1"); // Change the button status
pushstack(bbtags, thetag); cstat(); } } else { // Find the last occurance of the opened tag lastindex = 0;
for (i = 0 ; i < bbtags.length; i++ ) { if ( bbtags[i] == thetag ) { lastindex = i; } }
// Close all tags opened up to that tag was opened while (bbtags[lastindex]) { tagR...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php Size: 15.25 kB Created: 2022-12-02 21:30:06 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(scripts[s].JS); } } BX.ajax.processScripts(scripts, true); // commentEr object may be set in template if(window.commentEr && window.commentEr == "Y") { BX('err_comment_'+this.id[1]).innerHTML = data; } else { if(BX('edit_id').value > 0) { var commentId = 'blg-comment-'+this.id[1]; if(BX(commentId)) { var newComment = BX.create('div',{'html':data}); // tmp container for data // paste resp...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/.default/script.php Size: 26.06 kB Created: 2022-12-02 21:30:06 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Line: 140 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open");
if (tagOpen == 0) { if (doInsert("[" + thetag + "]", "[/" + thetag + "]", true)) { eval(thetag + "_open = 1"); // Change the button status
pushstack(bbtags, thetag); cstat(); } } else { // Find the last occurance of the opened tag lastindex = 0;
for (i = 0 ; i < bbtags.length; i++ ) { if ( bbtags[i] == thetag ) { lastindex = i; } }
// Close all tags opened up to that tag was opened while (bbtags[lastindex]) { tagR...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/highloadblock/lib/highloadblocktable.php Size: 19.60 kB Created: 2022-12-02 21:30:06 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($eval); } $entity = $entity_data_class::getEntity(); $uFields = $USER_FIELD_MANAGER->getUserFields(static::compileEntityId($hlblock['ID'])); foreach ($uFields as $uField) { if ($uField['MULTIPLE'] == 'N') { $params = array( 'required' => $uField['MANDATORY'] == 'Y' ); $field = $USER_FIELD_MANAGER->getEntityField($uField, $uField['FIELD_NAME'], $params); $entity->addField($field); foreach ($USER_FIELD_MANAGER->getEntityReferences($uField, $field) as $reference) { $entity->addField($reference...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/dwstroy.pricechanger/classes/general/pricechanger.php Size: 58.93 kB Created: 2025-02-10 09:54:47 Modified: 2025-02-10 09:54:47 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($formula); CPrice::Update($ar_res[ 'ID' ], array ('PRICE' => $x)); $usedPrices[ ] = $ar_res[ 'CATALOG_GROUP_ID' ]; } $priceFilter = array (); if ($data[ 'What' ] != 'Price_All'){ $priceFilter[ 'ID' ] = $filter[ 'CATALOG_GROUP_ID' ]; } $dbPriceType = CCatalogGroup::GetList( array ("SORT" => "ASC"), $priceFilter ); while ($arPriceType = $dbPriceType->Fetch()){ if (in_array($arPriceType[ 'ID' ], $usedPrices)){ continue; } $formula = $f; foreach ($step[ 'PRICE' ] as $p){ $new_price = (isset($ar...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/statistic/options.php Size: 37.49 kB Created: 2022-12-02 21:30:10 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($func); } } } } COption::SetOptionString($module_id, "IP_LOOKUP_CLASS", $IP_LOOKUP_CLASS); COption::SetOptionString($module_id, "ADV_EVENTS_DEFAULT", $ADV_EVENTS_DEFAULT); COption::SetOptionString($module_id, "USE_AUTO_OPTIMIZE", $USE_AUTO_OPTIMIZE); InitBVar($recount_base_currency); if ($recount_base_currency=="Y") CStatistics::RecountBaseCurrency($BASE_CURRENCY); COption::SetOptionString($module_id, "BASE_CURRENCY", $BASE_CURRENCY); $arr = array(); $arr = preg_split("/[\n\r]+/", $BROWSERS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/report/install/components/bitrix/report.view/templates/admin/template.php Size: 55.11 kB Created: 2022-12-02 21:30:10 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('response = ' + data); if (response) { if (response.imageData) { if (response.imageData.substr(0,10) === 'data:image') { img = BX('report-chart-image'); img.src = response.imageData; if (response.legendInfo) { var legendContainer = BX('report-chart-legend-container'); var legendRowExample = BX('report-chart-legend-row-example'); var chartType = requestData['type']; var legendNewRow, legendStick, legend...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/report/install/components/bitrix/report.construct/templates/.default/template.php Size: 40.26 kB Created: 2022-12-02 21:30:10 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(ySelects[i].name)) { colId = match[1]; if (colId !== null && yColumnsIndexes[colId] !== null) setSelectValue(ySelects[i], yColumnsIndexes[colId]); } } var chartCheckbox = BX('report-chart-display-checkbox'); if (chartCheckbox) { BX.bind(chartCheckbox, 'click', function () { var chartSwitchBlock = BX('report-chart-switch'); var chartParamsBlock = BX('report-chart-params'); if (chartSwitchBlock) { if (this.checked) BX.addClass(chartSwitchBloc...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/report/install/components/bitrix/report.construct/templates/admin/template.php Size: 40.02 kB Created: 2022-12-02 21:30:10 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(ySelects[i].name)) { colId = match[1]; if (colId !== null && yColumnsIndexes[colId] !== null) setSelectValue(ySelects[i], yColumnsIndexes[colId]); } } var chartCheckbox = BX('report-chart-display-checkbox'); if (chartCheckbox) { BX.bind(chartCheckbox, 'click', function () { var chartSwitchBlock = BX('report-chart-switch'); var chartParamsBlock = BX('report-chart-params'); if (chartSwitchBlock) { if (this.checked) BX.addClass(chartSwitchBloc...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/report/lib/internals/controller.php Size: 15.25 kB Created: 2022-12-02 21:30:12 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { try { if($this->request->isPost()) { \CUtil::jSPostUnescape(); $this->request->addFilter(new PostDecodeFilter); } $this->resolveAction(); $this->checkAction(); $this->checkRequiredModules(); if(!$this->prepareParams()) { $this->sendJsonErrorResponse(); } $action = $this->getAction(); if( $this->processBeforeAction($action) === true && $this->triggerOnBeforeAction($action) === true ) { $this->runAction(); } } catch(\Exception $e) { $this->runProcessingException($e); } } protected functio...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/lists/install/components/bitrix/lists.element.edit/component.php Size: 33.70 kB Created: 2022-12-02 21:30:12 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 606 Dangerous Malware Signature (hash: 11413268) |
eval($_POST
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/lists/lib/internals/controller.php Size: 10.36 kB Created: 2022-12-02 21:30:12 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { try { if($this->request->isPost()) { \CUtil::jSPostUnescape(); $this->request->addFilter(new PostDecodeFilter); } $this->resolveAction(); $this->checkAction(); $this->checkRequiredModules(); if(!$this->prepareParams()) { $this->sendJsonErrorResponse(); } if($this->processBeforeAction($this->getAction()) !== false) { $this->runAction(); } } catch(\Exception $e) { $this->runProcessingException($e); } } protected function getUser() { global $USER; return $USER; } protected function sendJso...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/mobileapp/install/components/bitrix/mobileapp.menu/templates/.default/template.php Size: 12.57 kB Created: 2022-12-02 21:30:12 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec("showAuthForm"); } } <?endif;?>
if(BX.PULL) { BX.addCustomEvent("onPullExtendWatch", function(data) { BX.PULL.extendWatch(data.id); });
BX.addCustomEvent("thisPageWillDie", function(data) { BX.PULL.clearWatch(data.page_id); });
BX.addCustomEvent("onPullEvent", function (module_id, command, params) { if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list')) { //app.onCustomEvent('onPullOnline', {...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/search/default_option.php Size: 742.00 B Created: 2022-12-02 21:30:14 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign b236d073 Line: 4 Dangerous Malware Signature (hash: b236d073) |
/*;*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sender/lib/integration/crm/connectors/querycount.php Size: 5.88 kB Created: 2022-12-02 21:30:16 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($query, $dataTypeId); } public static function getCount(Entity\Query $query, $dataTypeId = null) { self::prepare($query, $dataTypeId); return self::exec($query, $dataTypeId); } public static function getPreparedCount( Entity\Query $query, string $entityDbName, string $entityName, $dataTypeId = null ) { self::prepare($query, $dataTypeId, $entityDbName, $entityName); return self::exec($query, $dataTypeId, $entityDbName, $entityName); } protected static function exec(Entity\Query $query, $data...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sender/lib/integration/crm/connectors/querydata.php Size: 3.55 kB Created: 2022-12-02 21:30:16 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($query); } private static function prepare(Entity\Query $query, $dataTypeId = null) { $fields = self::getSelectFields(); foreach ($fields as $alias => $field) { if (is_numeric($alias)) { $alias = ''; } $query->addGroup('ID'); $query->addSelect($field, $alias); } return Helper::prepareQuery($query, $dataTypeId); } private static function exec(Entity\Query $query) { $result = $query->exec(); $result->addFetchDataModifier( function ($data) { { if (isset($data['EMAIL_MAILING']) && $data['EMAIL_...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/esol.massedit/lib/processor.php Size: 72.85 kB Created: 2024-02-27 08:48:50 Modified: 2025-02-10 08:08:46 Warns: 2
Description | Match |
---|
Exploit infected_comment Line: 181 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*Props*/
| Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($command); } } $val = trim($val); $val2 = trim($val2); $lowerVal = ToLower($val); $lowerVal2 = ToLower($val2); if(isset($this->arFieldList[$field]) && $this->arFieldList[$field]['type']=='date') { $floatVal = MakeTimeStamp($val); if(strpos($cond, 'LAST_N_DAYS')!==false) $floatVal2 = time() - $val2*24*60*60; else $floatVal2 = MakeTimeStamp($val2); } else { $floatVal = $this->GetFloatVal($val); $floatVal2 = $this->GetFloatVal($val2); } if(($cond=='EQ' && $lowerVal==$lowerVal2) || ($cond=='NEQ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/esol.massedit/lib/utils.php Size: 7.23 kB Created: 2024-02-27 08:48:50 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('crontab -l', $arLines); if(is_array($arLines)) { $cfg_data = implode("\n", $arLines); } if(strlen(trim($cfg_data))==0 && file_exists($_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg")) { $cfg_data = file_get_contents($_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"); } $pattern = "#^.*?".preg_quote('/bitrix/php_interface/include/'.static::$moduleId.'/cron_frame.php')." +".$profileId." *>.*?$#im"; if($arAutostart['TYPE']=='CRON') { $periodType = $arAutostart['CRON']['PERIOD_TYP...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/esol.massedit/admin/profile.php Size: 21.36 kB Created: 2025-02-10 09:54:47 Modified: 2025-02-10 09:54:47 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec('crontab -l', $arLines); if(is_array($arLines)) { foreach($arLines as $line) { $arLineParts = preg_split('/\s+/', $line); if(isset($arLineParts[5]) && !in_array($arLineParts[5], $arPaths) && stripos($arLineParts[5], 'php')!==false) { $arPaths[] = $arLineParts[5]; } } } $arVersions = array(); $arCheckedVersions = array(); if($checkPath && count($arPaths) > 1) { foreach($arPaths as $phpPath) { $arPhpLines = array(); $command = $phpPath.' -v'; @exec($command, $arPhpLines); if(is_array($arPhpLi...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/system_information.php Size: 8.56 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/event.php Size: 5.48 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function syslog Warning Potentially dangerous function `syslog` [https://www.php.net/syslog] |
syslog($this->syslogPriority, $message); } if ($this->isFileEngineActive) { if (!$message) $message = $this->messageFormatter->format($auditType, $itemName, $itemDescription); $message = static::sanitizeMessage($message); $message .= "\n"; $savedInFile = file_put_contents($this->filePath, $message, FILE_APPEND) > 0; } return ($savedInDB || $savedInSyslog || $savedInFile); } public static function getSyslogPriorities() { return static::$syslogPriorities; } public static function getSyslogFaciliti...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/tests/environment.php Size: 14.09 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function posix_getpwuid Warning Potentially dangerous function `posix_getpwuid` [https://www.php.net/posix_getpwuid] |
posix_getpwuid($uid); return sprintf('%s(%s)', $uid['name'], $uid['uid']); } return $uid; } protected static function formatGID($gid) { if(is_callable("posix_getgrgid")) { $gid = posix_getgrgid($gid); return sprintf('%s(%s)', $gid['name'], $gid['gid']); } return $gid; } protected static function formatFilePermissions($perms) { if (($perms & 0xC000) == 0xC000) { $info = 's'; } elseif (($perms & 0xA000) == 0xA000) { $info = 'l'; } elseif (($perms & 0x8000) == 0x8000) { $info = '-'; } elseif (($per...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/antivirus.php Size: 44.35 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit download_remote_code2 Line: 534 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($f, "\n------------------------------\n\$_SERVER:\n")
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/classes/general/post_filter.php Size: 6.63 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit download_remote_code2 Line: 163 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($f, "\n------------------------------\n\$_SERVER:\n")
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/en/classes/general/tests/php_configuration.php Size: 5.02 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 25 Dangerous Malware Signature (hash: 11413268) |
exploit
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/en/classes/general/tests/environment.php Size: 5.08 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 20 Dangerous Malware Signature (hash: 11413268) |
exploit
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/en/admin/security_antivirus.php Size: 2.24 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit file_prepend Line: 13 Dangerous LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
php_value auto_prepend_file
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/security/lang/ru/admin/security_antivirus.php Size: 3.09 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit file_prepend Line: 12 Dangerous LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
php_value auto_prepend_file
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/general/discount.php Size: 126.65 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('return '.$strUnpack.';'); } protected static function __ConvertOldConditions($strAction, &$arFields) { $strAction = ToUpper($strAction); if (!is_set($arFields, 'CONDITIONS')) { $arConditions = array( 'CLASS_ID' => 'CondGroup', 'DATA' => array( 'All' => 'AND', 'True' => 'True', ), 'CHILDREN' => array(), ); $intEntityCount = 0; $arIBlockList = self::__ConvertOldOneEntity($arFields, 'IBLOCK_IDS'); if (!empty($arIBlockList)) { $intEntityCount++; } $arSectionList = self::__ConvertOldOneEntity($...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/tools/iblock_subelement_generator.php Size: 30.64 kB Created: 2022-12-02 21:30:18 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(arFileProperties), id = 0; if(BX('ib_seg_max_property_id')) { id = BX('ib_seg_max_property_id').value; if(id >= obPropertyTable.AR_FILE_PROPERTIES.length + 2) { return; } BX('ib_seg_max_property_id').value = Number(BX('ib_seg_max_property_id').value) + 1; } obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';
var propertySpan = BX('ib_seg_property_span'); if(propertySpan) { var options = []; for(var key in fileProperties) { if(fileProperties....
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/load/yandex_simple_run.php Size: 12.03 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Dangers: 4
Description | Match |
---|
Exploit download_remote_code2 Line: 90 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, '<?if (!isset($_GET["referer1"])
| Exploit download_remote_code2 Line: 97 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, '<? $strReferer1 = htmlspecialchars($_GET["referer1"])
| Exploit download_remote_code2 Line: 98 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, '<?if (!isset($_GET["referer2"])
| Exploit download_remote_code2 Line: 99 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, '<? $strReferer2 = htmlspecialchars($_GET["referer2"])
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/load/yandex_run.php Size: 58.35 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Dangers: 4
Description | Match |
---|
Exploit download_remote_code2 Line: 1011 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, 'if (!isset($_GET["referer1"])
| Exploit download_remote_code2 Line: 1012 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, '$strReferer1 = htmlspecialchars($_GET["referer1"])
| Exploit download_remote_code2 Line: 1013 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, 'if (!isset($_GET["referer2"])
| Exploit download_remote_code2 Line: 1014 Dangerous RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine |
fwrite($fp, '$strReferer2 = htmlspecialchars($_GET["referer2"])
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/options.php Size: 90.32 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+result+')' ); var el = BX(res); BX(res).setAttribute('class', 'adm-btn'); if (el.bxwaiter && el.bxwaiter.parentNode) { el.bxwaiter.parentNode.removeChild(el.bxwaiter); el.bxwaiter = null; } el.disabled = false; } } </script> <? } $systemTabControl = new CAdminTabControl("tabControl2", $aTabs, true, true); $systemTabControl->Begin(); ?>
<?php if ($canUseYandexMarket) { $systemTabControl->BeginNextTab(); ?> <tr><td style="text-align: left;"><? $arAgentInfo ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/cat_store_document_edit.php Size: 63.33 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+result+')' ); if (res['id'] > 0) { res['quantity'] = 1; let obProductAdd = BX('productAdd'); if (BX.type.isElementNode(obProductAdd)) { obProductAdd.disabled = true; } addRow([res]); } } }
function enterBarcodes(id) { var amount; if(BX('CAT_DOC_AMOUNT_HIDDEN_'+id)) amount = parseInt(BX('CAT_DOC_AMOUNT_HIDDEN_'+id).value, 10); else amount = 0; if(isNaN(amount)) amount = 0; maxId = amount;
var content = BX.create('DIV',...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/export_setup.php Size: 63.57 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg", $arRetval, $return_var); if (intval($return_var)!=0) { $strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n"; if (is_array($arRetval) && !empty($arRetval)) { $strErrorMessage .= implode("\n", $arRetval)."\n"; } else { $strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n"; } } } } } if ($strErrorMessage == '') { $redirectUrl = "/bitrix/admin/cat_export_setup.php?lang=".urlencode(LANGUAGE_ID)."&success_export=Y"; $adm...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/import_setup.php Size: 60.99 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg", $arRetval, $return_var); if (intval($return_var)!=0) { $strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n"; if (is_array($arRetval) && !empty($arRetval)) { $strErrorMessage .= implode("\n", $arRetval)."\n"; } else { $strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n"; } } } } } if ($strErrorMessage == '') { $redirectUrl = "/bitrix/admin/cat_import_setup.php?lang=".urlencode(LANGUAGE_ID)."&success_import=Y"; $adm...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/catalog/admin/cat_product_search.php Size: 9.61 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("window.opener.document.<?= $form_name ?>.<?= $field_name ?>"); if(el) el.value = id; <?if ($field_name_name <> ''):?> el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_name ?>"); if(el) el.value = name; <?endif;?> <?if ($field_name_url <> ''):?> el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_url ?>"); if(el) el.value = url; <?endif;?> <?if ($alt_name <> ''):?> el = window.opener.document.getElementById("<?= $alt_n...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/src/Test/IntegrationTestCase.php Size: 8.25 kB Created: 2022-12-02 21:30:22 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('$ret = '.$condition.';'); if (!$ret) { $this->markTestSkipped($condition); } } $loader = new ArrayLoader($templates); foreach ($outputs as $i => $match) { $config = array_merge([ 'cache' => false, 'strict_variables' => true, ], $match[2] ? eval($match[2].';') : []); $twig = new Environment($loader, $config); $twig->addGlobal('global', 'global'); foreach ($this->getRuntimeLoaders() as $runtimeLoader) { $twig->addRuntimeLoader($runtimeLoader); } foreach ($this->getExtensions() as $extension)...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/src/Environment.php Size: 51.72 kB Created: 2022-12-02 21:30:24 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('?>'.$content); } } if (!class_exists($cls, false)) { throw new RuntimeError(sprintf('Failed to load Twig template "%s", index "%s": cache might be corrupted.', $name, $index), -1, $source); } } if (!$this->runtimeInitialized) { $this->initRuntime(); } return $this->loadedTemplates[$cls] = new $cls($this); } public function createTemplate($template, $name = null) { $hash = hash('sha256', $template, false); if (null !== $name) { $name = sprintf('%s (string template %s)', $name, $hash); } els...
| Sign 11413268 Line: 497 Dangerous Malware Signature (hash: 11413268) |
eval('?>
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/tests/ErrorTest.php Size: 7.64 kB Created: 2022-12-02 21:30:24 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(sprintf('%s %s debug', \PHP_BINARY, escapeshellarg(__DIR__.'/Fixtures/errors/leak-output.php'))); $this->assertSame('Hello OOPS', $output); } public function testDoesNotTwigLeakOutput() { $output = exec(sprintf('%s %s', \PHP_BINARY, escapeshellarg(__DIR__.'/Fixtures/errors/leak-output.php'))); $this->assertSame('', $output); } } class ErrorTest_Foo { public function bar() { throw new \Exception('Runtime error...')
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/xzag.telegram/vendor/twig/twig/tests/EnvironmentTest.php Size: 21.76 kB Created: 2022-12-02 21:30:24 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(<<<EOF use Twig\Extension\AbstractExtension;
class EnvironmentTest_ExtensionInEval extends AbstractExtension { } EOF ); $extension = new \EnvironmentTest_ExtensionInEval(); $loader = new ArrayLoader(['page' => 'hey']); $twig = new Environment($loader); $twig->addExtension($extension); $this->assertInstanceOf('\Twig\Extension\ExtensionInterface', $twig->getExtension(\get_class($extension))); $this->assertTrue($twig->isTemplateFresh('page', time())); } public function testInitRuntimeWithAnEx...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/install/components/bitrix/landing.start/lang/en/component.php Size: 5.85 kB Created: 2022-12-02 21:30:34 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 301ca578 Line: 36 Dangerous Malware Signature (hash: 301ca578) |
Trojan
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/block.php Size: 120.04 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1 Dangers: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('?>' . $content . '<?'); } catch (\ParseError $e) { $errMessage = $this::getMessageBlock([ 'MESSAGE' => Loc::getMessage('LANDING_BLOCK_MESSAGE_ERROR_EVAL') ]); if ($params['wrapper_show']) { echo '<div id="' . $anchor . '" class="block-wrapper' . (!$this->active ? ' landing-block-deactive' : '') . '">' . $errMessage . '</div>'; } else { echo $errMessage; } } } } elseif ($this->active || $params['force_unactive']) { static $sysPagesSites = []; if (!array_key_exists($this->siteId, $sysPagesSi...
| Sign 11413268 Line: 2858 Dangerous Malware Signature (hash: 11413268) |
eval('?>
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/mutator.php Size: 20.29 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Dangers: 2
Description | Match |
---|
Sign 99fc3b9d Line: 1 Dangerous Malware Signature (hash: 99fc3b9d) |
$GLOBALS['____
| Sign ae7830db Line: 1 Dangerous Malware Signature (hash: ae7830db) |
yZXBsYWNl
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page.php Size: 4.53 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/layout.php Size: 1.53 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(): void { if ($this->execCustom()) { return; } $breakpoint = trim(HtmlFilter::encode($this->fields['BREAKPOINT'])); if(!$breakpoint) { $breakpoint = self::DEFAULT_BREAKPOINT; } Manager::setPageView('MainClass', 'landing-layout-breakpoint--' . $breakpoint)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/gacounter.php Size: 3.60 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } if ($this->fields['USE']->getValue() != 'Y') { return; } $this->setCounter($this->fields['COUNTER']); $sendData = []; if ($this->fields['SEND_CLICK']->getValue() == 'Y') { $sendData[] = 'click'; } if ($this->fields['SEND_SHOW']->getValue() == 'Y') { $sendData[] = 'show'; } if (!empty($sendData)) { \Bitrix\Landing\Manager::setPageView( 'BodyTag', ' data-event-tracker=\'' . json_encode($sendData) . '\'' ); $clickType = $this->fields['CLICK_TYPE']->getV...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/yacounter.php Size: 2.70 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } if ($this->fields['USE']->getValue() != 'Y') { return; } $this->setCounter($this->fields['COUNTER']); } public static function setCounter(string $counter): void { $counter = \htmlspecialcharsbx(trim($counter)); $counter = \CUtil::jsEscape($counter); if (!$counter) { return; } Cookies::addCookieScript( 'ym', '(function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date();k=e.createElement(t),a=e.getElements...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/fonts.php Size: 5.81 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if (!self::$setFonts) { return; } $this->fields['CODE'] = str_replace( ['st yle', 'onl oad', 'li nk'], ['style', 'onload', 'link'], $this->fields['CODE'] ); $styleFound = preg_match_all( '#(<noscript>.*?<style.*?data-id="([^"]+)"[^>]*>[^<]+</style>)#is', $this->fields['CODE'], $matches ); $fonts = []; if ($styleFound) { $fonts = array_combine($matches[2], $matches[1]); } $this->outputFonts($fonts); } protected function outputFonts(array $fonts): void { $setFonts = []; foreach (self::$se...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/robots.php Size: 1.17 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { return $this->fields['CONTENT']->getValue()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/pixelfb.php Size: 4.01 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $zone = ''; if (Loader::includeModule('bitrix24')) { $zone = \CBitrix24::getPortalZone(); } elseif (file_exists($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/ru") && !file_exists($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/ua")) { $zone = 'ru'; } if ($zone === 'ru') { return; } $counter = null; $businessPixel = $this->getBusinessPixel(); if ($this->fields['USE']->getValue() === 'Y') { $counter = \htmlspecialcharsbx(trim($this->fields[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/cookies.php Size: 5.15 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(): void { if ($this->execCustom()) { return; } if ($this->fields['USE']->getValue() == 'Y') { $infoMode = $this->isInformationMode(); if (!$infoMode) { self::$enabled = true; Manager::clearPageView('Noscript'); } ob_start(); Manager::getApplication()->includeComponent( 'bitrix:landing.cookies', '', [ 'USE' => $this->fields['USE']->getValue(), 'POSITION' => $this->fields['POSITION']->getValue(), 'COLOR_BG' => $this->fields['COLOR_BG']->getValue(), 'COLOR_TEXT' => $this->fields['COLOR_TEXT']-...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metamain.php Size: 2.49 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $title = \htmlspecialcharsbx(Seo::processValue('title', $this->fields['TITLE'])); $description = Seo::processValue('description', $this->fields['DESCRIPTION']); $keywords = Seo::processValue('keywords', $this->fields['KEYWORDS']); if ($title != '') { Manager::setPageTitle($title); } if ($description != '') { Manager::getApplication()->setPageProperty( 'description', $description ); } if ($keywords != '') { Manager::getApplication()->setPageProperty( ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/favicon.php Size: 2.54 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $picture = intval($this->fields['PICTURE']->getValue()); if ($picture > 0) { $icons = ''; $sizes = array('16x16', '32x32', '96x96'); foreach ($sizes as $size) { list($w, $h) = explode('x', $size); $file = \CFile::resizeImageGet( \Bitrix\Landing\File::getFileArray($picture), array( 'width' => $w, 'height' => $h ), BX_RESIZE_IMAGE_EXACT ); $srcExplode = explode('.', $file['src']); $ext = array_pop($srcExplode); $icons .= '<link rel="icon" type="image/'...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/b24button.php Size: 6.33 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $code = \htmlspecialcharsbx(trim($this->fields['CODE'])); if ($code != 'N') { Landing\Manager::setPageView( 'BeforeBodyClose', '<script data-skip-moving="true"> (function(w,d,u,b){ \'use strict\'; var s=d.createElement(\'script\');var r=(Date.now()/1000|0);s.async=1;s.src=u+\'?\'+r; var h=d.getElementsByTagName(\'script\')[0];h.parentNode.insertBefore(s,h); })(window,document,\'' . $code . '\'); </script>' ); if ($this->fields[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/ymap.php Size: 2.01 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } if (!Manager::availableOnlyForZone('ru')) { return; } $code = HtmlFilter::encode(trim($this->fields['CODE'])); $assets = Asset::getInstance(); $assets->addString( "<script defer> (function(){ 'use strict'; //fake function, if API will loaded fasten than blocks window.onYandexMapApiLoaded = function(){} })(); </script>" ); $assets->addString( '<script src="https://api-maps.yandex.ru/2.1/?apikey=' . $code . '&lang=ru_RU&onload...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/copyright.php Size: 1.12 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metayandexverification.php Size: 1.51 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $meta = trim($this->fields['META']); if (preg_match('#^<meta\s+name="yandex-verification"\s+content="[a-z0-9_\-]+"\s+/*>$#i', $meta)) { Manager::setPageView('BeforeHeadClose', $meta)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/gmap.php Size: 1.71 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $code = HtmlFilter::encode(trim($this->fields['CODE'])); $assets = Asset::getInstance(); $assets->addString( "<script defer> (function(){ 'use strict'; //fake function, if API will loaded fasten than blocks window.onGoogleMapApiLoaded = function(){} })(); </script>" ); $assets->addString( '<script defer src="https://maps.googleapis.com/maps/api/js?key=' . $code . '&callback=onGoogleMapApiLoaded"></script>' )
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/up.php Size: 855.00 B Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $assets = Assets\Manager::getInstance(); $assets->addAsset('landing_upper')
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metaog.php Size: 4.23 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $output = ''; $files = []; $tags = [ 'title' => \htmlspecialcharsbx(Seo::processValue('title', $this->fields['TITLE'])), 'description' => \htmlspecialcharsbx(Seo::processValue('description', $this->fields['DESCRIPTION'])), 'image' => trim($this->fields['IMAGE']), 'type' => 'website' ]; foreach (['og', 'twitter'] as $rootTag) { foreach ($tags as $key => $val) { if ($key == 'image' && intval($val) > 0) { $val = intval($val); if (!array_key_exists($val,...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/view.php Size: 2.18 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(): void { if ($this->execCustom()) { return; } $type = trim($this->fields['TYPE']); $bodyClass = ''; $mainClasses = ''; if ($type === 'ltr') { $bodyClass = 'landing-viewtype--ltr'; $mainClasses = 'g-pt-6 g-px-10 g-pt-30--md g-px-50--md'; } elseif ($type === 'all') { $bodyClass = 'landing-viewtype--all'; $mainClasses = 'g-py-6 g-px-10 g-py-30--md g-px-50--md'; } elseif ($type === 'mobile') { $bodyClass = 'landing-viewtype--mobile'; $mainClasses = 'mx-auto'; } elseif ($type === 'adaptive') { ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/speed.php Size: 2.67 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(): void { if (Landing::getEditMode()) { $this->disableWebpack(); } else { $this->execWebpack(); $this->execLazyLoad(); } } protected function disableWebpack(): void { $assets = Assets\Manager::getInstance(); $assets->setStandartMode(); } protected function execWebpack(): void { $assets = Assets\Manager::getInstance(); if ($this->fields['USE_WEBPACK']->getValue() !== 'N') { $assets->setWebpackMode(); } else { $assets->setStandartMode(); } } protected function execLazyLoad(): void { if ($this...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/pixelvk.php Size: 1.89 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Cookies::addCookieScript( 'vkp', '!function(){ var t=document.createElement("script"); t.type="text/javascript", t.async=!0, t.src="https://vk.com/js/api/openapi.js?160", t.onload=function(){VK.Retargeting.Init("' . $counter . '"), VK.Retargeting.Hit()},document.head.appendChild(t) }();' ); Manager::...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/themefonts.php Size: 11.46 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(): void { if ($this->execCustom()) { return; } $this->setThemeFont(); $this->setHFontTheme(); $this->setSize(); $this->setColors(); $this->setTypo(); } protected function getField(string $name): ?string { if ($field = $this->fields[$name]->getValue()) { return HtmlFilter::encode(trim($field)); } return self::getDefaultValues()[$name]; } protected static function getDefaultValues(): array { return [ 'CODE' => 'Open Sans', 'CODE_H' => 'Open Sans', 'SIZE' => '1', 'LINE_HEIGHT' => '1.6', 'FONT_...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/background.php Size: 4.48 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $picture = \htmlspecialcharsbx(trim($this->fields['PICTURE']->getValue())); $color = \htmlspecialcharsbx(trim($this->fields['COLOR']->getValue())); $position = trim($this->fields['POSITION']->getValue()); $this->setBackground($picture, $color, $position); } public static function setBackground(?string $picture, ?string $color = null, ?string $position = null): void { if ($picture && is_numeric($picture) && (int)$picture > 0) { $picture = \htmlspecial...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/cssblock.php Size: 1.73 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $cssCode = trim($this->fields['CODE']); $cssFile = trim($this->fields['FILE']); if ($cssCode != '') { echo '<style type="text/css">' . $cssCode . '</style>'; } if ($cssFile != '') { echo '<link href="' . \htmlspecialcharsbx($cssFile)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/settings.php Size: 8.51 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { } public static function getDataForSite($id = null) { static $settings = array(); if (isset($settings[$id])) { return $settings[$id]; } $settings[$id] = array(); if ($id) { $hooks = Hook::getData( $id, Hook::ENTITY_TYPE_SITE ); } foreach (self::getDefaultValues() as $key => $defValue) { if (isset($hooks['SETTINGS'][$key])) { $settings[$id][$key] = $hooks['SETTINGS'][$key]; } else { $settings[$id][$key] = $defValue; } } if (!Manager::isB24()) { $settings[$id]['IBLOCK_ID'] = isset($hooks[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/gtm.php Size: 2.33 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $counter = \htmlspecialcharsbx(trim($this->fields['COUNTER'])); $counter = \CUtil::jsEscape($counter); if ($counter) { Cookies::addCookieScript( 'gtm', '(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({\'gtm.start\':new Date().getTime(),event:\'gtm.js\'}); var f=d.getElementsByTagName(s)[0], j=d.createElement(s), dl=l!=\'dataLayer\'?\'&l=\'+l:\'\'; j.async=true; j.src=\'https://www.googletagmanager.com/gtm.js?id=\'+i+dl; f.parent...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metarobots.php Size: 1.16 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } if (\Bitrix\Landing\Landing::getPreviewMode()) { $use = 'N'; } else { $use = $this->fields['INDEX']->getValue(); } \Bitrix\Main\Page\Asset::getInstance()->addString( '<meta name="robots" content="' . ($use != 'N' ? 'all' : 'noindex') . '" />' )
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/metagoogleverification.php Size: 1.47 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->execCustom()) { return; } $meta = trim($this->fields['META']); if (preg_match('#^<meta\s+name="google-site-verification"\s+content="[a-z0-9_\-]+"\s+/*>$#i', $meta)) { Manager::setPageView('BeforeHeadClose', $meta)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/headblock.php Size: 2.99 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { if ($this->isLocked()) { return; } if ($this->execCustom()) { return; } $code = trim($this->fields['CODE']); if ($code != '') { self::$lastInsertedCode = $code; $code = str_replace( '<script', '<script data-skip-moving="true"', $code ); \Bitrix\Main\Page\Asset::getInstance()->addString($code)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/landing/lib/hook/page/theme.php Size: 11.36 kB Created: 2022-12-02 21:30:38 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec(): void { $defaultColors = self::getColorCodes(); $request = Application::getInstance()->getContext()->getRequest(); if ($request->get('color')) { $colorHex = $request->get('color'); } elseif ( ($themeCodeFromRequest = $request->get('theme')) && array_key_exists($themeCodeFromRequest, $defaultColors) ) { $themeCode = $themeCodeFromRequest; $colorHex = $defaultColors[$themeCodeFromRequest]['color']; } else { $colorHex = HtmlFilter::encode(trim($this->fields['COLOR']->getValue())); if (!$colo...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/classes/general/lessc.inc.php Size: 96.44 kB Created: 2023-02-02 23:19:36 Modified: 2025-02-10 08:08:46 Dangers: 2
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main3/component_epilog.php Size: 69.38 kB Created: 2023-02-02 23:27:38 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 500 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main5/component_epilog.php Size: 69.36 kB Created: 2023-02-02 23:27:38 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 495 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main/component_epilog.php Size: 73.82 kB Created: 2023-02-02 23:28:00 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 915 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS_{$templateData[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main2/component_epilog.php Size: 66.01 kB Created: 2023-02-02 23:27:38 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 503 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/catalog.element/main4/component_epilog.php Size: 78.58 kB Created: 2023-02-02 23:28:00 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 944 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "BASKET_URL" => $arParams["BASKET_URL"], "ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"], "PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"], "PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"], "USE_PRODUCT_QUANTITY" => 'N', "OFFER_TREE_PROPS_{$templateData[...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/aspro.next/install/wizards/aspro/next/site/templates/aspro_next/components/bitrix/sale.gift.main.products/main/template.php Size: 6.68 kB Created: 2023-02-02 23:25:12 Modified: 2025-02-10 08:08:46 Dangers: 2
Description | Match |
---|
Exploit clever_include Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""), "ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""), "LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "OFFER_ADD_PICT_PROP" => (isset($arPara...
| Exploit clever_include Line: 79 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE" => $arParams["PRICE_VAT_INCLUDE"], "CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"], "CURRENCY_ID" => $arParams["CURRENCY_ID"], "HIDE_NOT_AVAILABLE" => $arParams["HIDE_NOT_AVAILABLE"], "TEMPLATE_THEME" => (isset($arParams["TEMPLATE_THEME"]) ? $arParams["TEMPLATE_THEME"] : ""),
"ADD_PICT_PROP" => (isset($arParams["ADD_PICT_PROP"]) ? $arParams["ADD_PICT_PROP"] : ""),
"LABEL_PROP" => (isset($arParams["LABEL_PROP"]) ? $arParams["LABEL_PROP"] : ""), "O...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/support/admin/ru/ticket_message_js.php Size: 6.66 kB Created: 2022-12-02 21:30:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Line: 29 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(thetag + "_open"); if (tagOpen == 0) { if (DoInsert(objTextarea, "<"+thetag+">", "</"+thetag+">")) { eval(thetag + "_open = 1"); eval("document.form1." + thetag + ".value += '*'"); } } else { DoInsert(objTextarea, "</"+thetag+">", ""); eval("document.form1." + thetag + ".value = ' " + eval(thetag + "_title") + " '"); eval(thetag + "_open = 0"); } BX.fireEvent(objTextarea, 'change'); }
function mozillaWr(textarea, open, close) { var selLength = textarea.textLength;...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/classes/general/subelement.php Size: 56.17 kB Created: 2022-12-02 21:30:40 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(\''.CUtil::JSEscape($this->onLoadScript).'\');'; echo '</script></body></html>'; } else { if($this->onLoadScript) echo '<script type="text/javascript">'.$this->onLoadScript.'</script>'; echo $string; } define("ADMIN_AJAX_MODE", true); require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_after.php"); die(); } elseif ($this->isExportMode()) { $fname = basename($APPLICATION->GetCurPage(), ".php"); $fname = str_replace(array("\r", "\n"), "", $fname); header("Content-Typ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/.default/template.php Size: 64.58 kB Created: 2022-12-02 21:30:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 1132 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/bootstrap_v4/template.php Size: 64.75 kB Created: 2022-12-02 21:30:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Line: 1167 Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'], 'CACH...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/store_v3/template.php Size: 67.30 kB Created: 2022-12-02 21:30:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Exploit clever_include Dangerous LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine |
INCLUDE' => $arParams['PRICE_VAT_INCLUDE'], 'CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'], 'BASKET_URL' => $arParams['BASKET_URL'], 'ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'], 'PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'], 'PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'], 'USE_PRODUCT_QUANTITY' => 'N', 'PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'], 'CACHE_GROUPS' => $arParams['CACHE_GROUPS'], 'POTENTI...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.sections.top/component.php Size: 17.92 kB Created: 2022-12-02 21:30:40 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 180 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/install/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php Size: 14.80 kB Created: 2022-12-02 21:30:42 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(scripts[s].JS); } } BX.ajax.processScripts(scripts, true); // commentEr object may be set in template if(window.commentEr && window.commentEr == "Y") { BX('err_comment_'+this.id[1]).innerHTML = data; } else { if(BX('edit_id').value > 0) { var commentId = 'blg-comment-'+this.id[1]; if(BX(commentId)) { var newComment = BX.create('div',{'html':data}); // tmp container for data // paste resp...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/lib/model/section.php Size: 2.01 kB Created: 2022-12-02 21:30:46 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($entity); self::$entityInstance[$iblockId] = $entityName; } return self::$entityInstance[$iblockId]; } protected static function resolveIblockId($iblock): ?int { $iblockId = null; if ($iblock instanceof Iblock) { $iblockId = $iblock->getId(); } elseif (is_string($iblock)) { $row = IblockTable::query() ->addSelect('ID') ->where('API_CODE', $iblock) ->fetch(); if (!empty($row)) { $iblockId = (int)$row['ID']; } } if (empty($iblockId) && is_numeric($iblock)) { $iblockId = (int)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/iblock/admin/iblock_subelement_generator.php Size: 28.34 kB Created: 2022-12-02 21:30:46 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(arFileProperties), id = 0; if(BX('ib_seg_max_property_id')) { id = BX('ib_seg_max_property_id').value; if(id >= obPropertyTable.AR_FILE_PROPERTIES.length + 2) { return; } BX('ib_seg_max_property_id').value = Number(BX('ib_seg_max_property_id').value) + 1; } obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';
var propertySpan = BX('ib_seg_property_span'); if(propertySpan) { var options = []; for(var key in fileProperties) { if(fileProperties....
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/webprostor.core/classes/general/functions.php Size: 23.36 kB Created: 2022-12-02 21:30:46 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Exploit concat_vars_with_spaces Line: 32 Warning Concatenation of vars technique is usually used for the obfuscation of malicious code |
$subA.$subG.$subD.$subB.$subH.$subF.$subC.$subI.
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/general/discount.php Size: 54.51 kB Created: 2022-12-02 21:30:46 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('$checkOrder='.$strUnpack.';'); if (!is_callable($checkOrder)) return false; $boolRes = $checkOrder($arOrder); unset($checkOrder); return $boolRes; } protected static function __ApplyActions(&$arOrder, $strActions) { $applyOrder = null; if (!empty($strActions)) { eval('$applyOrder='.$strActions.';'); if (is_callable($applyOrder)) $applyOrder($arOrder); } } protected static function __ConvertOldFormat($strAction, &$arFields) { global $APPLICATION; $arMsg = array(); $boolResult = true; $arNee...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/general/sale_report_helper.php Size: 110.21 kB Created: 2022-12-02 21:30:46 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( 'function ___dbCastIntToChar($dbtype, $param)'. '{'. ' $result = $param;'. ' if (ToLower($dbtype) === "mssql")'. ' {'. ' $result = "CAST(".$param." AS VARCHAR)";'. ' }'. ' return $result;'. '}' ); } if (self::$bUsePriceTypesColumns) { foreach (self::$priceTypes as $id => $info) { if ($info['selected'] === true) { $fieldName = 'PRICE_TYPE_'.$id; $runtime[$fieldName] = array( 'data_type' => 'string', 'expression' => array(' (SELECT '.$DB->Concat(___dbCastIntToChar('mysql'...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/.default/template.php Size: 15.64 kB Created: 2022-12-02 21:30:48 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 7830f7a6 Line: 11 Dangerous Malware Signature (hash: 7830f7a6) |
nc-l
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/admin/template.php Size: 13.68 kB Created: 2022-12-02 21:30:48 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 7830f7a6 Line: 17 Dangerous Malware Signature (hash: 7830f7a6) |
nc-l
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php Size: 0.99 kB Created: 2022-12-02 21:30:50 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 15 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php Size: 864.00 B Created: 2022-12-02 21:30:50 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 15 Dangerous Malware Signature (hash: 11413268) |
eval($_REQUEST
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.location.selector.system/templates/.default/template.php Size: 17.99 kB Created: 2022-12-02 21:30:52 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php', 'query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&', $urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN, 'pageSize' => $component::PAGE_SIZE, 'hugeTailLen' => $component::HUGE_TA...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.basket.order.ajax/component.php Size: 38.65 kB Created: 2022-12-02 21:30:52 Modified: 2025-02-10 08:08:46 Dangers: 1
Description | Match |
---|
Sign 11413268 Line: 556 Dangerous Malware Signature (hash: 11413268) |
eVal($_POST
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/install/components/bitrix/sale.notice.product/templates/.default/template.php Size: 7.43 kB Created: 2022-12-02 21:30:52 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Line: 130 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+res+')' );
if (rs['ERRORS'].length > 0) { if (rs['ERRORS'] == 'NOTIFY_ERR_NULL') BX('popup_n_error').innerHTML = '<?=GetMessageJS('NOTIFY_ERR_NULL')?>'; else if (rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA') BX('popup_n_error').innerHTML = '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>'; else if (rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST') { BX('popup_n_error').innerHTML = '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>'; ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/discountbase.php Size: 155.77 kB Created: 2022-12-02 21:30:54 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval($evalCode); } catch (\ParseError $e) { $this->showAdminError(); } } else { eval($evalCode); } unset($evalCode); if (!is_callable($checkOrder)) return false; $result = $checkOrder($this->orderData); unset($checkOrder); } else { if (!is_callable($discountLink[$executeKey])) return false; $result = $discountLink[$executeKey]($this->orderData); } unset($discountLink); return $result; } protected function applySaleDiscount() { $result = new Result; Discount\Actions::clearApplyCounter(); $discoun...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/compatible/discountcompatibility.php Size: 44.44 kB Created: 2022-12-02 21:30:54 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('$applyProduct='.$orderApplication.';'); if (is_callable($applyProduct)) $applyProduct($fields); unset($applyProduct); if (!empty($fields['DISCOUNT_RESULT'])) { self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR_DATA'] = $fields['DISCOUNT_RESULT']['BASKET']; self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR'] = self::formatDescription($fields['DISCOUNT_RESULT']); } unset($fields['DISCOUNT_RESULT']); } unset($orderApplication); } unset($discount, $index); return tr...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/location/import/compiler/compiler.php Size: 75.72 kB Created: 2022-12-02 21:30:54 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system('cp '.$workDir.self::STATIC_CSV_DIR.'externalservice.csv '.$workDir.'/'.self::OUTPUT_DIR); system('cp '.$workDir.self::STATIC_CSV_DIR.'type.csv '.$workDir.'/'.self::OUTPUT_DIR); } private $currentParentGroup = ''; private function addItemToCSV($fName, $group, $item) { $data = array( 'CODE' => $item['CODE'], 'PARENT_CODE' => $item['PARENT_CODE'], 'TYPE_CODE' => $item['TYPE_CODE'] ); $data['NAME.RU.NAME'] = ''; $data['NAME.EN.NAME'] = ''; $data['NAME.UA.NAME'] = ''; $name = unserialize($ite...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/discount/preset/basepreset.php Size: 23.95 kB Created: 2022-12-02 21:30:54 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec() { $isPost = $this->request->isPost(); $stepName = $this->getStepName(); $state = $this->getState(); if($stepName === $this->getFirstStepName() && !$isPost && $this->isDiscountEditing()) { $state = $this->generateState($this->discount); } if($this->isRunningPrevStep()) { $stepName = $state->getPrevStep(); } if($isPost && !$this->isRunningPrevStep()) { list($state, $nextStep) = $this->runStep($stepName, $state, self::MODE_SAVE); if($stepName != $nextStep) { $state->addStepChain($stepName); ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/internals/product.php Size: 8.76 kB Created: 2022-12-02 21:30:54 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( 'function ___dbCastIntToChar($dbtype, $param)'. '{'. ' $result = $param;'. ' if (ToLower($dbtype) === "mssql")'. ' {'. ' $result = "CAST(".$param." AS VARCHAR)";'. ' }'. ' return $result;'. '}' ); } $fieldsMap = array( 'ID' => array( 'data_type' => 'integer', 'primary' => true ), 'TIMESTAMP_X' => array( 'data_type' => 'integer' ), 'DATE_UPDATED' => array( 'data_type' => 'datetime', 'expression' => array( $DB->datetimeToDateFunction('%s'), 'TIMESTAMP_X', ) ), 'QUANTITY' => a...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/lib/internals/conversionhandlers.php Size: 13.14 kB Created: 2022-12-02 21:30:54 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Exploit infected_comment Line: 283 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*array*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/handlers/paysystem/yandexinvoice/lang/en/.description.php Size: 952.00 B Created: 2022-12-02 21:30:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Line: 3 Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (ShopID)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/handlers/paysystem/yandex/lang/en/.description.php Size: 2.62 kB Created: 2022-12-02 21:30:58 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
system (scid)"; $MESS["SALE_HPS_YANDEX_SCID_DESC"] = "Showcase identifier in payment collector system (scid)
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/report_construct.php Size: 22.89 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('('+res+')'); filters = BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true); for(i in filters) { if (filters[i].tagName == 'SELECT') { filterType = filters[i].getAttribute('tid'); if (filterType) { fRewriteSelectFromArray(filters[i], res[filterType], ''); } filters[i].value = ''; } } } } function ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/yandexinvoice_settings.php Size: 9.31 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 2
Description | Match |
---|
Function proc_close Warning Potentially dangerous function `proc_close` [https://www.php.net/proc_close] |
proc_close($process); $dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId); if ($dbRes->fetch()) \Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey)); else \Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId, 'PKEY' => $privateKey)); } else { $errorMsg = Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIGURED'); } if ($errorMsg === '') { $redirectUrl = $APPLICATION->GetCurPage()."?pay_system_id=".$id."&lang=".L...
| Function proc_open Warning Potentially dangerous function `proc_open` [https://www.php.net/proc_open] |
proc_open($command, $descriptorSpec, $pipes); $privateKey = stream_get_contents($pipes[1]); $return_value = proc_close($process); $dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId); if ($dbRes->fetch()) \Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey)); else \Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId, 'PKEY' => $privateKey)); } else { $errorMsg = Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIG...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/order_new.php Size: 274.77 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+res+')' );
if (rss["status"] == "ok") { BX('CART_FIX').value= 'N';
var userEl = BX("user_id"); var orderID = '<?=$ID?>';
locationID = rss["location_id"]; locationZipID = rss["location_zip_id"];
insertHtmlResult(document.getElementById("buyer_type_change"), rss['buyertype']); insertHtmlResult(document.getElementById("buyer_type_delivery"), rss['buyerdelivery']);
<?if(CSaleLocation::isLocationProEnabled()):?> initZipHandling(); <?endif?...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/buyers.php Size: 16.50 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Exploit infected_comment Line: 537 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*BUYER*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/delivery.php Size: 11.61 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("document.find_form.filter_lang"); filter_order_price_from = eval("document.find_form.filter_order_price_from"); filter_order_price_to = eval("document.find_form.filter_order_price_to"); f_currency = eval("document.find_form.f_currency");
var i, esum; if (parseInt(filter_lang.selectedIndex)==0) { filter_order_price_from.disabled = true; filter_order_price_to.disabled = true; f_currency.value = ""; } else { filter_order_price_from.disa...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/discount_preset_list.php Size: 14.14 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Exploit infected_comment Line: 56 Warning Comments composed by 5 random chars usually used to detect if a file is infected yet |
/*close*/
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/1c_admin_profile.php Size: 16.48 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("var cur_type = ''; if (typeof(param_" + pkey + "_type_" + ind + ") == 'string') cur_type = param_" + pkey + "_type_" + ind + ";"); eval("var cur_val = ''; if (typeof(param_" + pkey + "_value_" + ind + ") == 'string') cur_val = param_" + pkey + "_value_" + ind + ";"); eval("var cur_name = ''; if (typeof(param_" + pkey + "_name_" + ind + ") == 'string') cur_name = param_" + pkey + "_name_" + ind + ";");
if(cur_name.length > 0) { num = pkey.substr(pkey.lastIndexOf('_')+1); src = BX("...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/report_view.php Size: 23.12 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval('('+res+')'); filters = BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true); for(i in filters) { if (filters[i].tagName == 'SELECT') { filterType = filters[i].getAttribute('tid'); if (filterType) { fRewriteSelectFromArray(filters[i], res[filterType], ''); } } } } } function fRewriteSelectFromArray(select, dat...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/ymarket.php Size: 21.94 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+result+')' ); BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>').innerHTML = ' ' + res['text'];
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success'); BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_fail');
if (res['status'] == 'ok') BX.addClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success'); else BX.addClas...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/order_detail.php Size: 152.97 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+res+')' ); BX.closeWait();
if (!!rs.STATUS_ERR && true == rs.STATUS_ERR) { var obStatusErr = BX('change_status_err'); if (!!obStatusErr) { obStatusErr.innerHTML = rs.STATUS_ERR_MESS; obStatusErr.style.display = 'inline-block'; } } else { if (BX('date_status_change') && rs['DATE_STATUS'] && rs['DATE_STATUS'].length > 0) ...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/location_edit.php Size: 21.05 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("document.fform.COUNTRY_ID"); CHANGE_COUNTRY = eval("document.fform.CHANGE_COUNTRY");
<?if ($ID>0):?> if (parseInt(COUNTRY_LIST.selectedIndex)==0) { CHANGE_COUNTRY.checked = false; } <?endif;?>
if (parseInt(COUNTRY_LIST.selectedIndex)==0 <?if ($ID>0) echo "|| CHANGE_COUNTRY.checked";?>) { SetEnabled(true); } else { SetEnabled(false); } } </script>
<select name="COUNTRY_ID" OnChange="SetContact()"> <option value="...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/admin/affiliate_plan_edit.php Size: 23.80 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval("document.form1.MODULE_ID_" + cnt); if (!m) return;
if (m[m.selectedIndex].value == "catalog") ShowHideSectionBox(cnt, true); else ShowHideSectionBox(cnt, false); }
var itm_id = new Object(); var itm_name = new Object();
function ChlistIBlock(cnt, n_id) { var max_lev = itm_lev; var nex = document.form1["SECTION_SELECTOR_LEVEL_" + cnt + "[0]"]; var iBlock = eval("document.form1.SECTION_IBLOCK_ID_" + cnt); var iBlockID = iBlock[iBl...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/ru/payment/yandex_3x/ru/payment.php Size: 3.10 kB Created: 2022-12-02 21:31:00 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Line: 49 Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval( '('+result+')' ); BX('https_check_result').innerHTML = ' ' + res['text'];
BX.removeClass(BX('https_check_result'), 'https_check_success'); BX.removeClass(BX('https_check_result'), 'https_check_fail');
if (res['status'] == 'ok') BX.addClass(BX('https_check_result'), 'https_check_success'); else BX.addClass(BX('https_check_result'), 'https_check_fail'); }); }; checkHTTPS()
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/worldpay/.description.php Size: 3.71 kB Created: 2022-12-02 21:31:02 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function system Warning Potentially dangerous function `system` [https://www.php.net/system] |
System (via http://www.worldpay.com/admin). In the new window that "; $psDescription .= "opens you will need to scroll down to the section headed Installations and select the Configuration options button corresponding to the instId you are using.<br>"; $psDescription .= "You need to complete the following settings:<br>"; $psDescription .= "- <b>Callback URL</b><br>This should be set to the complete address to your callback URL (this file), hosted on your server.<br>"; $psDescription .= "You shou...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/payflow_pro/action.php Size: 5.77 kB Created: 2022-12-02 21:31:02 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($ret_com, $arOutput, $ret_var); $strOutput = $arOutput[0]; parse_str($strOutput, $arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $OUTPUT_STATUS = (($arResult["RESULT"] == 0) ? "Y" : "N"); $OUTPUT_STATUS_CODE = $arResult["RESULT"]; $OUTPUT_STATUS_DESCRIPTION = $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"]; $OUTPUT_STATUS_MESSAGE = $arResult["PNREF"]; $OUTPUT_SUM = $INPUT_SUM; $OUTPUT_CURRENCY = "USD"; $OUTPUT_RESPONSE_DATE = Date(CDatabase::DateFormatToPHP(CLang::...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/payflow_pro/payment.php Size: 9.77 kB Created: 2022-12-02 21:31:02 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($ret_com, $arOutput, $ret_var); $strOutput = $arOutput[0]; parse_str($strOutput, $arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arFields = array( "PS_STATUS" => (($arResult["RESULT"]==0) ? "Y" : "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CLang::GetDateFormat("FULL", LANG))) ); $arResult["R...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/sale/payment/payflow_pro/pre_payment.php Size: 8.22 kB Created: 2022-12-02 21:31:02 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function exec Warning Potentially dangerous function `exec` [https://www.php.net/exec] |
exec($ret_com, $arOutput, $ret_var); $strOutput = $arOutput[0]; parse_str($strOutput, $arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arPaySysResult = array( "PS_STATUS" => (($arResult["RESULT"] == 0) ? "Y" : "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_SUM" => $AMT, "PS_CURRENCY" => "USD", "PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CL...
|
|
/home/web/web/vsavto.com/public_html/bitrix/modules/seo/lib/businesssuite/serviceadapter.php Size: 3.45 kB Created: 2022-12-02 21:31:02 Modified: 2025-02-10 08:08:46 Warns: 1
Description | Match |
---|
Function eval Warning Potentially dangerous function `eval` [https://www.php.net/eval] |
eval(" class $serviceWrapperClassName extends Bitrix\Seo\BusinessSuite\ServiceWrapper implements Bitrix\Seo\Retargeting\IService, Bitrix\Seo\Retargeting\IMultiClientService, Bitrix\Seo\BusinessSuite\IInternalService {} "); return $serviceWrapperClassName::getInstance(); } } } public static function loadFacebookService(): ?ServiceAdapter { if($serviceWrapper = Utils\ServicePool::getService([Service::INSTAGRAM_TYPE,Service::FACEBOOK_TYPE])) { return (...
|
|