Help Center
Interpreting a security scan of your files
In this article from our knowledge base, you will discover how to analyze the results, identify possible vulnerabilities, and take measures to protect your site. Get ready to strengthen the security of your website.
The results are categorized by colors: yellow, purple, green, blue, orange, and red.
Files classified as YELLOW "MS Windows Binary/Executable [application/x-winexec]":
These are executable files that may function on a Windows system but are not functional on a Linux shared hosting service. You can safely delete them if your application doesn't require them.
These are executable files that may function on a Windows system but are not functional on a Linux shared hosting service. You can safely delete them if your application doesn't require them.
Files classified as YELLOW "World writeable directory":
These records indicate that the analyzed folders have incorrect permissions, which have a very low security level. However, our system has corrected these permissions for you. It is ESSENTIAL to verify if the folders detected with incorrect permissions belong to your application and REMOVE THEM if they are not part of your regular use.
These records indicate that the analyzed folders have incorrect permissions, which have a very low security level. However, our system has corrected these permissions for you. It is ESSENTIAL to verify if the folders detected with incorrect permissions belong to your application and REMOVE THEM if they are not part of your regular use.
Files classified as PURPLE "Suspicious file type [application/x-c]":
These files have an invalid structure or extension for a shared web hosting service. You should confirm if they are necessary, and if not, you should delete them if your application doesn't require them.
These files have an invalid structure or extension for a shared web hosting service. You should confirm if they are necessary, and if not, you should delete them if your application doesn't require them.
Files classified as GREEN "Universal decode regex match = [universal decoder]":
These files have detected possible malicious code, so you should check each one to confirm if they contain any vulnerabilities. In some cases, this code may not be malicious, but it is uncommon for the antivirus.
These files have detected possible malicious code, so you should check each one to confirm if they contain any vulnerabilities. In some cases, this code may not be malicious, but it is uncommon for the antivirus.
Files classified as BLUE "Script version check [OLD]":
These applications are outdated, which could pose a security risk as attackers may exploit vulnerabilities. They should be updated promptly.
These applications are outdated, which could pose a security risk as attackers may exploit vulnerabilities. They should be updated promptly.
Files classified as ORANGE "Regular expression match":
You should analyze these files one by one to confirm that they do not contain programming statements that could harm, steal, or further compromise your application and all the information hosted on your cPanel.
You should analyze these files one by one to confirm that they do not contain programming statements that could harm, steal, or further compromise your application and all the information hosted on your cPanel.
Files classified as RED "Known exploit ":
These files require IMMEDIATE attention. Besides being compromised, they actively use your information, and it is evident that they contain malicious code. You should confirm this with your developer to locate the compromised code and remove it; otherwise, your application will fail, and you will face security issues. Your site may be labeled as dangerous, and your domain may be blocked in emails, among other problems.
These files require IMMEDIATE attention. Besides being compromised, they actively use your information, and it is evident that they contain malicious code. You should confirm this with your developer to locate the compromised code and remove it; otherwise, your application will fail, and you will face security issues. Your site may be labeled as dangerous, and your domain may be blocked in emails, among other problems.
IMPORTANT
Generate a backup before making any changes, whether to your website, database, or other assets. Ensure you protect your data and have a backup to prevent any accidental loss.
Related articles
- Error Handling Using PHP: A Comprehensive Approach to Different Statements
- Versions and extensions of PHP in cPanel
- Connect Visual Studio Code to cPanel using SSH
- Debug and optimize the log table in Moodle
- Resolving Website Display Issues with DNS over HTTPS (DoH)
- Block IP addresses in cPanel, protect your website
- Resolve navigation issues by changing DNS settings in Windows and MacOS
- Configure a remote MySQL Connection
- How to point a website or domain to Wix?
- Connect your domain to Shopify
- What is a power pack?
- What is WP Accelerate and How to Configure It?