59
Validation results

shaper_doctor

shaper_doctor

Joomla template 3.4
59
  • THEME TYPEJoomla template 3.4
  • FILE NAMEdoctor_template_j3_v1.8.zip
  • FILE SIZE2123232 bytes
  • MD55f77b29e5f090516bc92a81902b7f889
  • SHA1d42a3ac626438de168b563778f75205c0df4fe63
  • LICENSEGNU GPL 2
  • FILES INCLUDEDCSS, PHP, XML, Bitmap images, Adobe Illustrator
  • VERSION1.8
  • CREATION DATE2016-10-01
  • LAST FILE UPDATE2017-11-30
  • LAST VALIDATION2017-11-30 16:56
Critical alerts
  1. Security breaches : Use of base64_decode() Found base64_decode in file site.php.
    Ligne139: $recipient = base64_decode($input['value']);
  2. Malware : Operations on file system fopen was found in the file helix3.php
    Ligne71: $file = fopen($layoutPath.$layoutName.'.json', 'wb');
    fwrite was found in the file helix3.php
    Ligne72: fwrite($file, $content);
    fclose was found in the file helix3.php
    Ligne73: fclose($file);
    file_get_contents was found in the file helix3.php
    Ligne80: $content = file_get_contents($filepath);
    file_get_contents was found in the file lessc.inc.php
    Ligne121: $root = $parser->parse(file_get_contents($realPath));
    Ligne1830: $out = $this->compile(file_get_contents($fname), $fname);
    fwrite was found in the file lessc.inc.php
    Ligne687: // fwrite(STDERR,'failed to find block: '.implode(' > ', $path).'\n');
    file_get_contents was found in the file lessc.inc.php
    Ligne121: $root = $parser->parse(file_get_contents($realPath));
    Ligne1830: $out = $this->compile(file_get_contents($fname), $fname);
    file_put_contents was found in the file lessc.inc.php
    Ligne1835: return file_put_contents($outFname, $out);
    file_put_contents was found in the file helix3.php
    Ligne746: file_put_contents($cacheFile, serialize($newCache));
    Ligne747: file_put_contents($css, $newCache['compiled']);
    file_put_contents was found in the file helix3.php
    Ligne746: file_put_contents($cacheFile, serialize($newCache));
    Ligne747: file_put_contents($css, $newCache['compiled']);
Warning
  1. Security breaches : Use of base64_encode()Found base64_encode in file frontediting_modules.php.
     $redirectUri = '&return='. urlencode(base64_encode(JUri::getInstance()->toString()));
    Found base64_encode in file default_login.php.
     <input type='hidden' name='return' value='<?php echo base64_encode($this->params->get('login_redirect_url', $this->form->getValu
    Found base64_encode in file default_logout.php.
     <input type='hidden' name='return' value='<?php echo base64_encode($this->params->get('logout_redirect_url', $this->form->getVal
    Found base64_encode in file offline.php.
     <input type='hidden' name='return' value='<?php echo base64_encode(JUri::base()); ?>' />
    Found base64_encode in file site.php.
     $output .= '<input type='hidden' name='recipient' value='' . base64_encode($recipient_email) . ''>';
Other checked themes