D S

Forum Replies Created

Viewing 5 posts - 1 through 5 (of 5 total)
  • Author
    Posts
  • in reply to: Automated scans? #1533

    D S
    Member

    I never received a reply to my previous question.

    Also, once we “donate” do we get some form of prioritized support?

    in reply to: Automated scans? #1486

    D S
    Member

    Awesome!! I’ll be making my donation. :)

    Speaking of donation, I have your plugin setup on all of my sites. How will each site/plugin installation know I’ve donated and unlocks core scans and automated updates on each site?

    in reply to: Automated scans? #1481

    D S
    Member

    First off, thank you for this awesome tool!!

    I know if I make a donation of $29 or more I will get automated definition updates as well as core scanning, which is awesome. I was just wondering if it’s possible to get automated scheduled scanning and if it finds malware it can either automatically fix it or notify us via email. I think this would be an awesome feature for an already great plugin!

    in reply to: WP Site Guardian warnings #1460

    D S
    Member

    I should note that the 3 warnings are coming from 3 different IPs.

    in reply to: WP Site Guardian warnings #1459

    D S
    Member

    This morning 3 of my sites received the exact same “possible security threat” warnings from my WP Site Guardian security plugin. GOTMLS.NET scans come up clean and any potential threats are clean. Can you help me understand this threat warning and why malware scans don’t show anything please?

    Normal
    0

    false
    false
    false

    EN-US
    X-NONE
    X-NONE

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:”Table Normal”;
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:”";
    mso-padding-alt:0in 5.4pt 0in 5.4pt;
    mso-para-margin:0in;
    mso-para-margin-bottom:.0001pt;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:”Calibri”,”sans-serif”;
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-fareast-font-family:”Times New Roman”;
    mso-fareast-theme-font:minor-fareast;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;}

    Time: 2016-03-01 06:51:09
    URL: http://alconmedia.com/index.php?liu=qt&fukq=t&RNv=f

    **********************************************
    Parameter: POST.sz
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#07
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.07
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#173
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.173
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#25
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.25
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.#21
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.21
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.lyf520
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.fuckyou4321
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.TExaL
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

    **********************************************
    Parameter: POST.w
    Data: echo (123454320+1);exit();
    Impact: 7/91
    Potential Vectors: Cross Site Scripting, Cross Site Request Forgery, Remote File Execution, Local File Inclusion

Viewing 5 posts - 1 through 5 (of 5 total)