Where we found the javascript link? → https://urlquery.net/report/32acf4cd-a7c3-4093-b2d2-7de002d3e58d
Hosted at see: https://www.shodan.io/host/94.102.217.154
Re: https://toolbar.netcraft.com/site_report?url=neuber.biz
DOM-XSS issues: Results from scanning URL: -https://connect.ekomi.de/integration_1364287645/B8895E9D8401B80.js
Number of sources found: 12 ; number of sinks found: 4
Retirable library: https://retire.insecurity.today/#!/scan/5113e32d11fec477e5a321790f44d0ad04365fd5e140c23de34ad8015f804f86
Privacy implications: https://privacyscore.org/site/134080/
Server-leaks - server-status - excessive server info proliferation: Server: Apache/2.2.9 (Debian) DAV/2 mod_ssl/2.2.9 OpenSSL/0.9.8g PHP/5.2.6-1+lenny13 with Suhosin-Patch - mode proxy vulnerable towards attacks. Potentially risky methods: TRACE unexpected token
See vulnberablities for -rixor.netbeat.de and for vulnerabilities the shodan IP page.
polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)