58
Validation results

lt_strategy

lt_strategy

Joomla template 3.3
58
  • THEME TYPEJoomla template 3.3
  • FILE NAMElt_strategy_joomla_template_install_package.zip
  • FILE SIZE1820394 bytes
  • MD507ef6a6fa121a6ddf1b5255dd3f76bc6
  • SHA1efe9cf12079df066595ef2c741c412669a402f21
  • LICENSEGNU GPL 2
  • FILES INCLUDEDCSS, PHP, XML, Bitmap images, Adobe Illustrator
  • VERSION1.0
  • CREATION DATE2015-01-01
  • LAST FILE UPDATE2017-09-10
  • LAST VALIDATION2017-09-10 14:31
Critical alerts
  1. Presence of iframes : iframes are sometimes used to load unwanted adverts and malicious code on another site Found <iframe src="//www.facebook.com/plugins/like.php?href=<?php echo $displayData['url']; ?> in file facebook.php.
    Line 10: <li><iframe src='//www.facebook.com/plugins/like.php?href=<?php echo $displayDa
    Found <iframe class="embed-responsive-item" src="<?php echo $video_src; ?> in file post_video.php.
    Line 38: <iframe class='embed-responsive-item' src='<?php echo $video_src; ?>' frame
  2. Malware : Operations on file system fopen was found in the file helix3.php
    Line 55: $file = fopen($layoutPath.$layoutName.'.json', 'wb');
    fwrite was found in the file helix3.php
    Line 56: fwrite($file, $content);
    fclose was found in the file helix3.php
    Line 57: fclose($file);
    file_get_contents was found in the file helix3.php
    Line 64: $content = file_get_contents($filepath);
    file_get_contents was found in the file lessc.inc.php
    Line 121: $root = $parser->parse(file_get_contents($realPath));
    Line 1830: $out = $this->compile(file_get_contents($fname), $fname);
    fwrite was found in the file lessc.inc.php
    Line 687: // fwrite(STDERR,'failed to find block: '.implode(' > ', $path).'\n');
    file_get_contents was found in the file lessc.inc.php
    Line 121: $root = $parser->parse(file_get_contents($realPath));
    Line 1830: $out = $this->compile(file_get_contents($fname), $fname);
    file_put_contents was found in the file lessc.inc.php
    Line 1835: return file_put_contents($outFname, $out);
    file_put_contents was found in the file helix3.php
    Line 684: file_put_contents($cacheFile, serialize($newCache));
    Line 685: file_put_contents($css, $newCache['compiled']);
    file_put_contents was found in the file helix3.php
    Line 684: file_put_contents($cacheFile, serialize($newCache));
    Line 685: file_put_contents($css, $newCache['compiled']);
Warning
  1. Security breaches : Use of base64_encode()Found base64_encode in file frontediting_modules.php.
     $redirectUri = '&return='. urlencode(base64_encode(JUri::getInstance()->toString()));
    Found base64_encode in file default_login.php.
     <input type='hidden' name='return' value='<?php echo base64_encode($this->params->get('login_redirect_url', $this->form->getValu
    Found base64_encode in file default_logout.php.
     <input type='hidden' name='return' value='<?php echo base64_encode($this->params->get('logout_redirect_url', $this->form->getVal
    Found base64_encode in file offline.php.
     <input type='hidden' name='return' value='<?php echo base64_encode(JUri::base()); ?>' />
  2. Unwanted files : hidden file(s) or folder(s).ds_store was found.
Other checked themes