59
Validation results

shaper_varsita

shaper_varsita

Joomla template 3.4
59
  • THEME TYPEJoomla template 3.4
  • FILE NAMEvarsita_templateonly_j3.zip
  • FILE SIZE1917797 bytes
  • MD59932680c8438b6e216a87ea26d4307d7
  • SHA14f0ce8404d4af4b1980d9d78d74b997edf2bf061
  • LICENSEGNU GPL 2
  • FILES INCLUDEDCSS, PHP, XML, Bitmap images, Adobe Illustrator
  • VERSION2.3
  • CREATION DATE2015-03-01
  • LAST FILE UPDATE2017-03-05
  • LAST VALIDATION2017-03-05 17:10
Critical alerts
  1. Presence of iframes : iframes are sometimes used to load unwanted adverts and malicious code on another site Found <iframe src="//www.facebook.com/plugins/like.php?href=<?php echo $displayData['url']; ?> in file facebook.php.
    Ligne10: <li><iframe src='//www.facebook.com/plugins/like.php?href=<?php echo $displayDa
    Found <iframe class="embed-responsive-item" src="<?php echo $video_src; ?> in file post_video.php.
    Ligne38: <iframe class='embed-responsive-item' src='<?php echo $video_src; ?>' frame
  2. Malware : Operations on file system fopen was found in the file helix3.php
    Ligne71: $file = fopen($layoutPath.$layoutName.'.json', 'wb');
    fwrite was found in the file helix3.php
    Ligne72: fwrite($file, $content);
    fclose was found in the file helix3.php
    Ligne73: fclose($file);
    file_get_contents was found in the file helix3.php
    Ligne80: $content = file_get_contents($filepath);
    file_get_contents was found in the file lessc.inc.php
    Ligne121: $root = $parser->parse(file_get_contents($realPath));
    Ligne1830: $out = $this->compile(file_get_contents($fname), $fname);
    fwrite was found in the file lessc.inc.php
    Ligne687: // fwrite(STDERR,'failed to find block: '.implode(' > ', $path).'\n');
    file_get_contents was found in the file lessc.inc.php
    Ligne121: $root = $parser->parse(file_get_contents($realPath));
    Ligne1830: $out = $this->compile(file_get_contents($fname), $fname);
    file_put_contents was found in the file lessc.inc.php
    Ligne1835: return file_put_contents($outFname, $out);
    file_put_contents was found in the file helix3.php
    Ligne828: file_put_contents($cacheFile, serialize($newCache));
    Ligne829: file_put_contents($css, $newCache['compiled']);
    file_put_contents was found in the file helix3.php
    Ligne828: file_put_contents($cacheFile, serialize($newCache));
    Ligne829: file_put_contents($css, $newCache['compiled']);
Warning
  1. Security breaches : Use of base64_encode()Found base64_encode in file frontediting_modules.php.
     $redirectUri = '&return='. urlencode(base64_encode(JUri::getInstance()->toString()));
    Found base64_encode in file default_login.php.
     <input type='hidden' name='return' value='<?php echo base64_encode($this->params->get('login_redirect_url', $this->form->getValu
    Found base64_encode in file default_logout.php.
     <input type='hidden' name='return' value='<?php echo base64_encode($this->params->get('logout_redirect_url', $this->form->getVal
    Found base64_encode in file offline.php.
     <input type='hidden' name='return' value='<?php echo base64_encode(JUri::base()); ?>' />
Other checked themes