WP Site Guardian warnings

Home Forums Support Forum WP Site Guardian warnings

This topic contains 2 replies, has 2 voices, and was last updated by  Anti-Malware Admin 8 years, 1 month ago.

Viewing 3 posts - 1 through 3 (of 3 total)
  • Author
    Posts
  • #1459

    D S
    Member

    This morning 3 of my sites received the exact same “possible security threat” warnings from my WP Site Guardian security plugin. GOTMLS.NET scans come up clean and any potential threats are clean. Can you help me understand this threat warning and why malware scans don’t show anything please?

    Normal
    0

    false
    false
    false

    EN-US
    X-NONE
    X-NONE

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:”Table Normal”;
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:”";
    mso-padding-alt:0in 5.4pt 0in 5.4pt;
    mso-para-margin:0in;
    mso-para-margin-bottom:.0001pt;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:”Calibri”,”sans-serif”;
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-fareast-font-family:”Times New Roman”;
    mso-fareast-theme-font:minor-fareast;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;}

    Time: 2016-03-01 06:51:09
    URL: http://alconmedia.com/index.php?liu=qt&fukq=t&RNv=f

    **********************************************
    Parameter: POST.sz
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#07
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.07
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#173
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.173
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#25
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.25
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#21
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.21
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.lyf520
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.fuckyou4321
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.TExaL
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.w
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    #1460

    D S
    Member

    I should note that the 3 warnings are coming from 3 different IPs.

    #1473

    Anti-Malware Admin
    Key Master

    I don’t know anything about WP Site Guardian but it looks like some kind of firewall that has detected an external attack in real time. This does not mean that your site is infected again, only that someone may have been trying to hack you. If you want more info on this you should contact the WP Site Guardian developers.

Viewing 3 posts - 1 through 3 (of 3 total)

You must be logged in to reply to this topic.

Comments are closed.