I can't say that's meaningful.
preg_match is a function that determines if text matches something. CSRF is a different type of vulnerability. Levens(h)tein is a method for determine "edit distances" for strings.
None of it really adds up. If he wants to demo something then I'm quite happy to do more investigation but he hasn't given any indication of, well, anything.
I do some script and I can intrude in the server. Not only this but the other website which is your sibling on the hosting server. So its not a matter of report. You cannot manually fix it. On other hand, we can deploy a solution.
Well according this his post, he's gained access to your server
Is this by any chance a host trying to upsell?
In that case then, I've no clue what he's rambling on aboutNope he was to develop an add-on for us. I shared our test environment with him. I doubt he's access to the live server.
As per rule 1:Ah, the sweet or not so sweet smell of ********
Please do not attempt to circumvent the censoring options we have set up.
The guy is a bit see through. I'd say transparency: 0.3
We use essential cookies to make this site work, and optional cookies to enhance your experience.