From our control panel, you can directly access the "Security Alerts" section to monitor detected vulnerabilities in your hostings. This section provides you with a detailed overview of the most recent vulnerabilities affecting your WordPress websites.
Common Vulnerabilities and Exposures (CVE) represent a reference point for identifying security vulnerabilities. Each vulnerability or exposure is assigned a unique identifier (CVE-ID), making it easier to manage security issues and compare different security tools that address the same problems.
Once you access the cdmon control panel, you will find a button labeled "Security Alerts" in the top bar.
In this section, a summary of the alerts detected in your hostings will be displayed. Vulnerabilities are shown using different colors depending on their level of criticality, making it easier to quickly identify the most serious issues.
This summary contains security-related information for your WordPress website and will help you take the necessary steps to protect it.
Domain: Indicates the domain/hosting name affected by the vulnerability.
Path: Shows the specific location within your domain where the vulnerability was detected. This can be useful for identifying affected plugins or themes.
CVE: This is the unique identifier assigned to the known vulnerability. You can click the link shown in the panel or use this code to search for more details online.
Score: Represents the severity of the vulnerability on a scale from 1 to 10. A higher score indicates greater urgency to take corrective action.
Risk: This field classifies the risk level of the vulnerability as Low, Medium, or High, helping you prioritize the actions to take.
Description: Provides a predefined summary of the vulnerability to help you understand the issue.
Current version: Shows the version of the plugin, theme, or WordPress core you are using that contains the vulnerability.
Fixed version: Indicates the version in which the vulnerability has been fixed. You should update to this version or a later one to mitigate the risk.
IMPORTANT: Please note that even if changes have been made and the alerts have been resolved, they will not be shown as fixed in our control panel until the next analysis is performed.
Additionally, from this window, you have the option to download the vulnerability report in CSV format. Click the "Download CSV" button located in the upper-right corner of the alerts summary to obtain the CSV file containing an overview of all detected vulnerabilities:
At cdmon, we offer a WordPress consultancy service. For an additional cost, our specialized WordPress team will take care of updating and cleaning your site, ensuring it is fully functional and secure. This service includes identifying and resolving vulnerabilities, as well as updating plugins and themes.
From the cdmon Control Panel, you have the option to view information related to the server where your hosting is located, such as IP address and software versions. To view this information, you must access the hosting management section by clicking ...
The applications you install on your website may, under certain circumstances, generate errors that are recorded on the server. These errors can be of different types and you can view them in the Control Panel. To view the error log of your web ...
In the cdmon control panel you can activate or deactivate the application Firewall and view the graph showing the neutralized attack attempts. To activate it, you must access the hosting management section, under 'Security', and enter the Firewall ...
Common Vulnerabilities and Exposures (CVE) represent a reference point for identifying security vulnerabilities. Each vulnerability or exposure is assigned a unique identifier (CVE-ID), making it easier to manage security and compare different ...
Security is one of the most important aspects to consider when creating a blog or offering an online service through your website. 1.-The usefulness of CAPTCHA If you want a person to validate themselves as a user on a website, post a comment on a ...