Help Center

Interpreting a security scan of your files

In this article from our knowledge base, you will discover how to analyze the results, identify possible vulnerabilities, and take measures to protect your site. Get ready to strengthen the security of your website.

The results are categorized by colors: yellow, purple, green, blue, orange, and red.

Files classified as YELLOW "MS Windows Binary/Executable [application/x-winexec]":
These are executable files that may function on a Windows system but are not functional on a Linux shared hosting service. You can safely delete them if your application doesn't require them.

 

Files classified as YELLOW "World writeable directory":
These records indicate that the analyzed folders have incorrect permissions, which have a very low security level. However, our system has corrected these permissions for you. It is ESSENTIAL to verify if the folders detected with incorrect permissions belong to your application and REMOVE THEM if they are not part of your regular use.

 

Files classified as PURPLE "Suspicious file type [application/x-c]":
These files have an invalid structure or extension for a shared web hosting service. You should confirm if they are necessary, and if not, you should delete them if your application doesn't require them.

 

Files classified as GREEN "Universal decode regex match = [universal decoder]":
These files have detected possible malicious code, so you should check each one to confirm if they contain any vulnerabilities. In some cases, this code may not be malicious, but it is uncommon for the antivirus.

 

Files classified as BLUE "Script version check [OLD]":
These applications are outdated, which could pose a security risk as attackers may exploit vulnerabilities. They should be updated promptly.

 

Files classified as ORANGE "Regular expression match":
You should analyze these files one by one to confirm that they do not contain programming statements that could harm, steal, or further compromise your application and all the information hosted on your cPanel.

 

Files classified as RED "Known exploit ":
These files require IMMEDIATE attention. Besides being compromised, they actively use your information, and it is evident that they contain malicious code. You should confirm this with your developer to locate the compromised code and remove it; otherwise, your application will fail, and you will face security issues. Your site may be labeled as dangerous, and your domain may be blocked in emails, among other problems.

IMPORTANT

Generate a backup before making any changes, whether to your website, database, or other assets. Ensure you protect your data and have a backup to prevent any accidental loss.

Last updated: 25 de abril de 2024

Estimated reading time: 4 minutes

Did this article help you?
Let's Do It!

Start TODAY for only $2.45/month

Includes a web builder, 30GB of cloud storage, +200 Apps, and professional email.

Sign Up Now