We would like to request removal and we’re happy to do anything to be complaint.
Here’s some information that hopefully will help.
We suspect we got blacklisted because people who promote are products are using unsolicited emails. We have hundreds of people promoting for us and it happens when just ONE person does it. We constantly prune bad affiliates but sometimes it slips through. We just removed some in the last week.
We only send emails to people when they have specifically requested it themselves. In fact, a big portion are only in our list AFTER they’ve bought our product.
Let me know if you need anything more or if we need to do anything and I will be happy to accommodate.
Site information in browser not secure. Vulnerable software Nginx, headers - 1.13.6
7.8
CVE-2018-16843
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
7.8
CVE-2018-16844
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
7.8
CVE-2018-16845
nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
5.8
CVE-2019-20372
NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
4.3
In the links you provided no Avast detection was displayed.Unfortunately we cannot simulate the path the customer used to take.I would need to inform what URL exact is when clicking on the cart button.