• Running maldet in the folder of my server returned the following warning
    however after running those files I couldn′t identify what is exactly the code considered dangerous
    so I can remove it. Has anybody faced a similar situation before?

    NOTE: quarantine is disabled! set quar_hits=1 in conf.maldet or to quarantine results run: maldet -q 093014-1551.527547
    FILE HIT LIST:
    {HEX}php.cmdshell.cih.218 : /home/username/public_html/wp-content/plugins/wp_config/mod_system.php
    {HEX}php.cmdshell.cih.218 : /home/username/public_html/wp-content/plugins/wp_sed/mod_system.php
    {HEX}php.cmdshell.cih.218 : /home/username/public_html/wp-content/themes/default/404.php
    {HEX}php.cmdshell.cih.218 : /home/username/public_html/wp/pack.php
    {HEX}php.cmdshell.cih.218 : /home/username/public_html/wp/mysql_class.php

  • The topic ‘{HEX}php.cmdshell.cih.218 in wordpress files’ is closed to new replies.