Jump to content

Featured Replies

Posted

Why is this site saying my install has a vulnerability?

How are you being told - are you testing against a site which checks for vulnerabilities or have you received an email?

Edited by Nathan Explosion

Which site is "this site"? AFAIK we don't list any vulnerabilities here for any site.

🤷‍♂️ you'd probably need to ask them what they're referring to. 

Who knows... Perhaps if you're lucky they'll also have a relative who is an exiled Nigerian Prince who direly needs to borrow just $10 to unlock his inheritance of millions and he'll pinky promise to give you a share.

 money idiot GIF by PRTG

  • 3 years later...
On 12/7/2020 at 5:05 PM, AlexWebsites said:

I got an email from them as well about one of my IPS installations. Something was reported

Did you evner get an answer from them about this? Got same email today - I’m on latest version…

58 minutes ago, Kjell Iver Johansen said:

Did you evner get an answer from them about this? Got same email today - I’m on latest version…

You are responding to something over 4 years old there, but the same answer would apply. You would need to ask for specifics on what they are referring to

It’s most likely a sales pitch. “Contact me right away to protect your users.” 

This rings right up there with “Contact us about your car’s extended warranty.”

They want you to offer them a reward for scanning and pentesting your site.  

I did not but got an email as well, today. 

5 hours ago, AlexWebsites said:

I did not but got an email as well, today. 

The answer would be the same as the 2 above. You would need more information from

  • 1 month later...
On 8/2/2024 at 9:53 AM, Marc said:

You are responding to something over 4 years old there, but the same answer would apply. You would need to ask for specifics on what they are referring to

Just got a Mail from them and on my site it was php info.php that was public. I have deleted it now. Not that dangerous but anyway…

This information includes the PHP version, server details, loaded extensions, environment variables, and more. An attacker can use this data to identify weaknesses in the server configuration and potentially craft specific attacks against the server.

Recently Browsing 0

  • No registered users viewing this page.