JAMSS

download JAMSS

If you can't read please download the document

description

coomla! Anti-Malware Scan Script

Transcript of JAMSS

JAMSS - Joomla! Anti-Malware Scan Script v.1.0.4 #results { font-size: 12px; } .file { font-weight: bold; color: blue; } .pattern { font-weight: bold; color: red; } .pattern_desc { font-style: italic; color: blueviolet; } .offset { font-weight: bold; font-style: italic; } .end { font-size: 18px; font-weight: bold; color: cadetblue; } #border-top div div { background-image:none !important } #border-top .title { padding-left: 20px; } #header-box { padding: 0.35em 1em; } .h_blue .version { float: right; margin: 25px 20px 0; color: #fff; } /* all */ #centermain, #element-box { padding: 30px !important; } /* 1.0 */ .title a { color: #fff } #joomla { height: 38px; color: #fff; } #joomla .title { font-size: 1.364em; font-weight: bold; line-height: 38px; padding-left: 14px; } #joomla .version { float: right; margin: 20px 60px 0; } #menu { background-color: #F1F3F5; padding: 0.35em 1em; } /* 3.0 */ .page-title a { color: #fff } .brand { height: 20px } #credits { float: right; margin-top: 5px; } pre { background-color: #F5F5F5; border-top: 1px #bbb solid; border-bottom: 1px #bbb solid; padding: 10px; }

Joomla! version: 1.5.26 StableJAMSS - Joomla! Anti-Malware Scan Script - v.1.0.4 Welcome to the Joomla! Anti Malware Scan Script

Here are the suspicious parts of code found in this scan process :

In file ./vechi12333/htaccess.txt-> we found 2 occurence(s) of Pattern #10 .HTAC RewriteCond-Referer ---> Details: "Your .htaccess file has a conditional redirection based on "HTTP Referer". This means it redirects according to site/url from where your visitors came to your site. Such technique has been used for unwanted redirections after coming from Google or other search engines, so check this directive carefully." @Offset: 256:... RewriteCond %{HTTP_REFERER} ^.*(google|ask|yahoo|baidu|youtube |wikipedia|qq|excite|altavista|msn|netscape|aol|hotbot|goto|infoseek|mamma|allth eweb|lycos|search|metacrawler|bing|dogpile|facebook|twitte ... @Offset: 1128:... RewriteCond %{HTTP_REFERER} ^.*(web|websuche|witch|wolong|oek oportal|freenet|arcor|alexana|tiscali|kataweb|voila|sfr|startpagina|kpnvandaag|i lse|wanadoo|telfort|hispavista|passagen|spray|eniro|telia|b ... --> ./vechi12333/htaccess.txt is a file. It was last accessed: 2012-11-03T13:38:12+02:00, last changed: 2012-11-16T21:37:31+02:00, last modified: 2012-09-17T15:24:39+03:00. File permissions:0644

In file ./vechi12333/templates/ol_stelek/scripts/tips.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code."

@Offset: 11677:... ') : '')); } function tt_MkMain ... --> ./vechi12333/templates/ol_stelek/scripts/tips.js is a file. It was last accessed: 2012-12-16T14:26:45+02:00, last changed: 2012-11-16T21:37:28+02:00, last modified: 2012-11-16T21:37:28+02:00. File permissions:0644

In file ./vechi12333/templates/ol_stelek/scripts/tips.js-> we found 11 occurence(s) of String 'ifrm' @Offset: 5581: ... ifrm = tt_aElt[tt_aElt.length - 1]; if(ifrm) { ifrm.style.left = css.left; ifrm.style.top = css.top; } } } function tt_Hide() { if(tt_db && tt_iState) { if(tt_iState & 0x2) { tt_ ... @Offset: 5622:... ifrm) { ifrm.style.left = css.left; ifrm.style.top = css.top; } } } function tt_Hide() { if(tt_db && tt_iState) { if(tt_iState & 0x2) { tt_aElt[0].style.visibility = "hidden"; t ... @Offset: 5635:... ifrm.style.left = css.left; ifrm.style.top = css.top; } } } function tt_Hide() { if(tt_db && tt_iState) { if(tt_iState & 0x2) { tt_aElt[0].style.visibility = "hidden"; tt_ExtCallFncs ... @Offset: 5666:... ifrm.style.top = css.top;

} } } function tt_Hide() { if(tt_db && tt_iState) { if(tt_iState & 0x2) { tt_aElt[0].style.visibility = "hidden"; tt_ExtCallFncs(0, "Hide"); } tt_tShow.End ... @Offset: 11693:... IfRm" src="javascript:false" scrolling="no" frameborder="0" style="filter:Alpha(opacity=0);position:absolute;top:0px;left:0px;display:none;" >') : '')); } function tt_MkMainDivDom() { var ... @Offset: 12116:... IfRm"); if(!tt_aElt[tt_aElt.length - 1]) tt_aElt[0] = null; } if(tt_aElt[0]) { var css = tt_aElt[0].style; css.visibility = "hidden"; css.position = "absolute"; css.overflow = "hidden ... @Offset: 25058:... Ifrm(); } function tt_ShowIfrm() { if(tt_ie56) { var ifrm = tt_aElt[tt_aElt.length - 1]; if(ifrm) { var css = ifrm.style; css.zIndex = tt_aElt[0].style.zIndex - 1; css.display = "bloc ... @Offset: 25084:... Ifrm() { if(tt_ie56) { var ifrm = tt_aElt[tt_aElt.length - 1]; if(ifrm) { var css = ifrm.style; css.zIndex = tt_aElt[0].style.zIndex - 1; css.display = "block"; } } } function tt_M ... @Offset: 25115:... ifrm = tt_aElt[tt_aElt.length - 1]; if(ifrm)

{ var css = ifrm.style; css.zIndex = tt_aElt[0].style.zIndex - 1; css.display = "block"; } } } function tt_Move(e) { e = window.event || e ... @Offset: 25156:... ifrm) { var css = ifrm.style; css.zIndex = tt_aElt[0].style.zIndex - 1; css.display = "block"; } } } function tt_Move(e) { e = window.event || e; if(e) { tt_musX = tt_GetEvtX(e); ... @Offset: 25179:... ifrm.style; css.zIndex = tt_aElt[0].style.zIndex - 1; css.display = "block"; } } } function tt_Move(e) { e = window.event || e; if(e) { tt_musX = tt_GetEvtX(e); tt_musY = tt_GetEvtY(e) ... --> ./vechi12333/templates/ol_stelek/scripts/tips.js is a file. It was last accessed: 2012-12-16T14:26:45+02:00, last changed: 2012-11-16T21:37:28+02:00, last modified: 2012-11-16T21:37:28+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/templates/horizon/scripts/src/controls.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 3951:... ./vechi12333/sorinat.net/blog/wp-includes/class-phpmailer.php is a file. It

was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/vars.php-> we found 1 occurence(s) of String 'multiviews' @Offset: 1336: ... Multiviews: /wp-admin/themes/index.php (themes.php is queried) } } else { if ( preg_match('#([^/]+\.php)([?/].*?)?$#i', $_SERVER['PHP_SELF'], $sel f_matches) ) $pagenow = strtolower($self_matches[1 ... --> ./vechi12333/sorinat.net/blog/wp-includes/vars.php is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/customize-loader.dev.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 2030:... ', { src: src }).appendTo( this.element ); this.iframe.one( 'load', this.loaded ); // Create a postMessage connection with the iframe. this.messenger = new api.Messenger({ url: ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/customize-loader.dev.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/customize-loader.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 1317:... ",{src:f}).appendTo(this.element);this.iframe.one(" load",this.loaded);this.messenger=new b.Messenger({url:f,channel:"loader",target Window:this.iframe[0].contentWindow});this.messenger.bind(" ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/customize-loader.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/tinymce/themes/advanced/js/about.js ->a we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code."

@Offset: 1757:... '; document.getElementById('iframecontainer').innerHTML = html; d ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/tinymce/themes/advanced/js/about.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/tinymce/plugins/spellchecker/classe s/GoogleSpell.php->z we found 2 occurence(s) of Pattern #1 - PHP: preg_replace Eval ---> Details: "We detected preg_replace function that evaluates (executes) mathed code. This means if PHP code is passed it will be executed." @Offset: 3099:... preg_replace('~([0-9a-f]+);~ei', 'chr(hexdec("\\1"))', $st ring); $string = preg_replace('~([0-9]+);~e', 'chr(\\1)', $string); $trans_tbl = get_html_translation_table(HTML_ENTITIES); $trans ... @Offset: 3179:... preg_replace('~([0-9]+);~e', 'chr(\\1)', $string); $trans_tbl = get_html_translation_table(HTML_ENTITIES); $trans_tbl = array_flip($trans_tbl); return strtr($string, $trans_tbl); } } // Pa ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/tinymce/plugins/spellchecker/classe s/GoogleSpell.php0 is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/tinymce/plugins/paste/js/pasteword. js->e we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 226:... '; ifr = document.getElementById('iframe'); doc = ifr.contentWindow.document; // Force absolut ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/tinymce/plugins/paste/js/pasteword. jsr is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed:

2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/thickbox/thickbox.js-> we found 3 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 1452:... "+thickboxL10n.noiframes+""); jQuery("#TB_overlay").click(tb_remove); } }else{//all others if(docum ... @Offset: 7472:... ./vechi12333/sorinat.net/blog/wp-includes/js/thickbox/thickbox.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/scriptaculous/controls.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 4041:... ./vechi12333/sorinat.net/blog/wp-includes/js/plupload/plupload.html4.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/jquery/jquery.form.dev.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 5863:... '); var io = $io[0]; $io.css({ position: 'absolute', top: '-1000px', left: '-1000px' }); var xhr = { // mock object abort ...

--> ./vechi12333/sorinat.net/blog/wp-includes/js/jquery/jquery.form.dev.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/jquery/jquery.form.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 2670:... ');va r B=x[0];x.css({position:"absolute",top:"-1000px",left:"-1000px"});var y={aborte d:0,responseText:null,responseXML:null,status:0,statusText: ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/jquery/jquery.form.js is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-includes/js/jquery/ui/jquery.ui.datepicker.min. js->n we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 32624:... ':""),a._keyEvent=!1,K},_generateMonthYearHeader:functi on(a,b,c,d,e,f,g,h){var i=this._get(a,"changeMonth"),j=this. ... --> ./vechi12333/sorinat.net/blog/wp-includes/js/jquery/ui/jquery.ui.datepicker.min. jsf is a file. It was last accessed: 2012-11-16T21:37:21+02:00, last changed: 2012-11-16T21:37:21+02:00, last modified: 2012-11-16T21:37:21+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/class-phpmailer.php->i we found 2 occurence(s) of Pattern #1 - PHP: preg_replace Eval ---> Details: "We detected preg_replace function that evaluates (executes) mathed code. This means if PHP code is passed it will be executed." @Offset: 62156:... preg_replace("/([^A-Za-z0-9!*+\/ -])/e", "'='.sprintf('%02X' , ord('\\1'))", $encoded); break; case 'comment': $encoded = preg_replace("/([\(\)\"])/e", "'='.sprintf('%02X', ord('\ ... @Offset: 62299:... preg_replace("/([\(\)\"])/e", "'='.sprintf('%02X', ord('\\1' ))", $encoded); case 'text': default: // Replace every high ascii, control =, ? and _ characters //TODO using /e ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/class-phpmailer.phpI

is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/vars.php->h we found 1 occurence(s) of String 'multiviews' @Offset: 1336: ... Multiviews: /wp-admin/themes/index.php (themes.php is queried) } } else { if ( preg_match('#([^/]+\.php)([?/].*?)?$#i', $_SERVER['PHP_SELF'], $sel f_matches) ) $pagenow = strtolower($self_matches[1 ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/vars.php is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/customize-loader.dev.js->6 we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 2030:... ', { src: src }).appendTo( this.element ); this.iframe.one( 'load', this.loaded ); // Create a postMessage connection with the iframe. this.messenger = new api.Messenger({ url: ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/customize-loader.dev.js. is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/customize-loader.js->3 we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 1317:... ",{src:f}).appendTo(this.element);this.iframe.one(" load",this.loaded);this.messenger=new b.Messenger({url:f,channel:"loader",target Window:this.iframe[0].contentWindow});this.messenger.bind(" ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/customize-loader.jse is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed:

2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/tinymce/themes/advanced/js/about.js->we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 1757:... '; document.getElementById('iframecontainer').innerHTML = html; d ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/tinymce/themes/advanced/js/about.jsg is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/tinymce/plugins/spellchecker/classes/GoogleSpell.php->3 we found 2 occurence(s) of Pattern #1 - PHP: preg_replace Eval ---> Details: "We detected preg_replace function that evaluates (executes) mathed code. This means if PHP code is passed it will be executed." @Offset: 3099:... preg_replace('~([0-9a-f]+);~ei', 'chr(hexdec("\\1"))', $st ring); $string = preg_replace('~([0-9]+);~e', 'chr(\\1)', $string); $trans_tbl = get_html_translation_table(HTML_ENTITIES); $trans ... @Offset: 3179:... preg_replace('~([0-9]+);~e', 'chr(\\1)', $string); $trans_tbl = get_html_translation_table(HTML_ENTITIES); $trans_tbl = array_flip($trans_tbl); return strtr($string, $trans_tbl); } } // Pa ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/tinymce/plugins/spellchecker/classes/GoogleSpell.php4 is a file. It was last accessed: 2012-11-16T21:37:19+02:00, last changed: 2012-11-16T21:37:19+02:00, last modified: 2012-11-16T21:37:19+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/tinymce/plugins/paste/js/pasteword.js-> we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid

code." @Offset: 226:... '; ifr = document.getElementById('iframe'); doc = ifr.contentWindow.document; // Force absolut ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/tinymce/plugins/paste/js/pasteword.js$ is a file. It was last accessed: 2012-11-16T21:37:19+02:00, last changed: 2012-11-16T21:37:19+02:00, last modified: 2012-11-16T21:37:19+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/thickbox/thickbox.js->t we found 3 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 1452:... "+thickboxL10n.noiframes+""); jQuery("#TB_overlay").click(tb_remove); } }else{//all others if(docum ... @Offset: 7472:... ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/thickbox/thickbox.jsw is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/scriptaculous/controls.js->r we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 4041:...

./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/plupload/plupload.html4.js is a file. It was last accessed: 2012-11-16T21:37:19+02:00, last changed: 2012-11-16T21:37:19+02:00, last modified: 2012-11-16T21:37:19+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/jquery/jquery.form.dev.js->1 we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 5863:... '); var io = $io[0]; $io.css({ position: 'absolute', top: '-1000px', left: '-1000px' }); var xhr = { // mock object abort ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/jquery/jquery.form.dev.jsw is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/jquery/jquery.form.js->o we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 2670:... ');va r B=x[0];x.css({position:"absolute",top:"-1000px",left:"-1000px"});var y={aborte d:0,responseText:null,responseXML:null,status:0,statusText: ... --> ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/jquery/jquery.form.jsp is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/jquery/ui/jquery.ui.datepicker.min.js->2 we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 32624:... ':""),a._keyEvent=!1,K},_generateMonthYearHeader:functi on(a,b,c,d,e,f,g,h){var i=this._get(a,"changeMonth"),j=this. ... -->

./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-in cludes/js/jquery/ui/jquery.ui.datepicker.min.jsr is a file. It was last accessed: 2012-11-16T21:37:20+02:00, last changed: 2012-11-16T21:37:20+02:00, last modified: 2012-11-16T21:37:20+02:00. File permissions:0644

In file ./vechi12333/sorinat.net/blog/wp-content/upgrade/wordpress-3.tmp/wordpress/wp-ad min/plugin-editor.php->6 we found 1 occurence(s) of Pattern #18 - IFRAME element ---> Details: "Found IFRAME element in code, please check if it's a valid code." @Offset: 6301:...