After recovery of a defacement hack website still left with insecurities.

See: -http://arkaim21vek.ru/
Detected libraries:
jquery - 1.2.6.pack : -http://arkaim21vek.ru/i/js/jquery-1.2.6.pack.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.2.6.pack : -http://arkaim21vek.ru/i/js/jquery-1.2.6.pack.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.2.6 : (active1) -http://arkaim21vek.ru/
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.2.6 : (active1) -http://arkaim21vek.ru/
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
4 vulnerable libraries detected

See: http://toolbar.netcraft.com/site_report?url=http://arkaim21vek.ru

Consider this script: http://www.domxssscanner.com/scan?url=http%3A%2F%2Farkaim21vek.ru%2Fi%2Fjs%2Fjquery-1.2.6.pack.js
Returning this

found JavaScript
     info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
     info: [decodingLevel=1] found JavaScript
     error: line:3: SyntaxError: invalid flag after regular expression:
          error: line:3: }).filter(function(){return this.name&&!this.disabled&&  *(this.checked||/select|textarea/i.test(this.nodeName)||/text|hidden|password/i.test(this.type))}).map(function(i,c){var b=D(this).val();return b==null?null:b.constructor==Array?D.map(b,function(a,i){r
          error: line:3: ^

error * function takes a url in the form of a string.Info credits go to Stackoverflow’s Mark Coleman.
Use replace in stead of a substring.

polonus (volunteer website security analyst and website error-hunter)