Boletines de Vulnerabilidades

FTP Logs Used to Determine Attack Vector


Información sobre el sistema

   
Software afectado Wordpress

Descripción

http://feedproxy.google.com/~r/sucuri/blog/~3/UwzT75JvuqY/ftp-logs-used-to-determine-attack-vector.html Logs can be very useful because they are a record of what was done by whom. They are especially useful when you need to find out more on how a website has been compromised. Since our job at Sucuri is to clean website malware, we don’t have any access to logs, or what we […]

More info:

http://feedproxy.google.com/~r/sucuri/blog/~3/UwzT75JvuqY/ftp-logs-used-to-determine-attack-vector.html

Identificadores estándar

Propiedad Valor
CVE

Histórico de versiones

Versión Comentario Fecha
1.0 Advisory issued 2019-06-13

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT