-- url of the page with the problem -- :
divorcetoolbox.com
-- HikaShop version -- : 3.4.0
-- HikaSerial version -- : 2.1.1
-- Joomla version -- : 3.8.8
-- PHP version -- : 7.2.6
-- Browser(s) name and version -- : various - updated
I got an email today from my server CXS scanner.
'/home/divotlbx/public_html/administrator/components/com_hikaserial/inc/tcpdf/include/tcpdf_fonts.php'
Regular expression match = [symlink\s*\(]
I looked at the file and it is referring to this line:
symlink($fontfile, $outpath.$fmetric['file']);
I don't see any 'actual' hacking so is this a false positive result?