Fairly illiterate when it comes to this stuff. Trying to get on a site that I am a member of and feel is safe. Avast aborts connection - URL:Phishing. I’ve put the web address in as an exception, but still can’t go there. Help!
calasfmra.com
Please break the link as I have in the quoted text to avoid accidental exposure and promoting the site.
Some security issues reported here - https://en.internet.nl/site/calasfmra.com/2355002/
Regarded as a medium security risk here - https://sitecheck.sucuri.net/results/calasfmra.com
Whilst no reports reported here there are a lot of external links - https://www.virustotal.com/gui/url/1be012d2ae3e473e804198e8643e8504f89f6d6e07569a4800ee6e149da1c9db/links - these links could be a possible reason why it is detected by Avast.
- Reporting a Possible False Positive File or Website - https://www.avast.com/false-positive-file-form.php.
You should get a response in a day or two.
Thank You - is there a way to override the protection and get to the site? I tried putting it in as an exception and it still won’t let me.
Personally I wouldn’t give advise that I’m not comfortable with and you appear to have tried that already.
You still haven’t broken the link as I suggested, not only does it exposure viewers to a suspect site, but web search engines trawl sites looking for urls, so it is also promoting the site. Intentionally doing that could be considered spamming which could result in a ban.
Report it as mentioned and the virus labs team will look at it.
Thank you. I think I broke the link. Wasn’t understanding what you meant at first, sorry!
You’re welcome.
It just stops the very curious clicking to see what’s there.
You’re best bet is to report it rather than try to add an exception.
Thank you so much for your help, DavidR. They responded and fixed it!
Glad I could help.
I’m having the same issues lately with constant “phishing URL” blocking of safe sites such as a prominent legal firm and the chat AI sidebar app. Very annoying.
Unfortunately there are no details at all to investigate.
Follow the advice above on how to provide the information and or report it.
A screenshot of the alert with the Details option selected, this could help us to help you:
- Attaching Images to your post - When you Click the Reply button it opens a text window for you to post your comment (reply or post).
Click the Preview button, that shows what you have input and expands it to include ‘Attachments and other options’. Click that it further expands, here you can attach images, etc. at the bottom of your post.
See my attached image, click to expand.
EDIT: also see this post - https://forum.avast.com/index.php?topic=325034.0
As this mentions Chat functions may be the issue.
There were seven WP-CMS issues found → https://urlscan.io/result/e1f215aa-016d-47e4-93ea-6e48d8fc0032/#indicators
WordPress Security Scan flags:
Plug-ins:
WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
Plugin Update Status About
easy-login-woocommerce 2.3 Warning latest release (2.5)
-http://xootix.com/easy-login-for-woocommerce
woocommerce 7.0.0 Warning latest release (8.1.1)
-https://woocommerce.com/
js_composer Unknown
listingpro-plugin Unknown
redux-framework 4.4.5 Warning latest release (4.4.7)
-http://wordpress.org/plugins/redux-framework
easy-tables-vc Unknown
wordpress-seo 21.0 Warning latest release (21.2)
-https://yoa.st/1uj
jetpack 12.5 Warning latest release (12.6.2)
-https://jetpack.com
woocustomizer 2.4.3 Warning latest release (2.5.4)
-https://kairaweb.com/wordpress-plugins/woocustomizer/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.
There are likely more plugins installed than those listed here as the detection method used here is passive. While these results give an indication of the status of plugin updates, a more comprehensive assessment should be undertaken by brute forcing the plugin paths using a dedicated tool.
Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.
Path Tested Status
/wp-content/uploads/ enabled
/wp-content/plugins/ disabled
Directory indexing is tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.
Also re: ttps://urlscan.io/result/e1f215aa-016d-47e4-93ea-6e48d8fc0032/#indicators
polonus