An exploit kit drop here?

See: https://www.virustotal.com/en/url/f1c9b2b0f31bfb0bead1d70bb88d3d2f5375881cadea3126817a636121796c4d/analysis/1457299544/
Quttera Labs - domain is Malicious.
“The malware entry is cached and may not reflect the current status of the domain”.
Consider: -/ka/216/%E1%83%97%E1%83%90%E1%83%95%E1%83%AF%E1%83%93%E1%83%9D%E1%83%9B%E1%83%90%E1%83%A0%E1%83%94
Link with outdated software: -http://edu.gba.ge/events-2/ტრენინგი/

See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fgba.ge%2Fka%2Fgallery%2F

Blacklisted link: -http://edu.gba.ge/events-2/ტრენინგი/
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fedu.gba.ge%2Fevents-2%2F%25e1%2583%25a2%25e1%2583%25a0%25e1%2583%2594%25e1%2583%259c%25e1%2583%2598%25e1%2583%259c%25e1%2583%2592%25e1%2583%2598%2F

Detected libraries:
jquery - 1.8.3 : (active1) -http://gba.ge/skins/default/js/jquery.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery-ui-dialog - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
Info: Severity: medium
http://bugs.jqueryui.com/ticket/6016
jquery-ui-autocomplete - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
jquery-ui-tooltip - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
Info: Severity: high
http://bugs.jqueryui.com/ticket/8859
(active) - the library was also found to be active by running code
3 vulnerable libraries detected
HTTP Server: Apache HTTP Server
PHP Version: 5.2.17 (Outdated)
Instant Cloud server: http://toolbar.netcraft.com/site_report/?url=www.gba.ge%2F → poor community ratings:
https://www.mywot.com/en/scorecard/proservice.ge?utm_source=addon&utm_content=rw-viewsc

Stealth and missing Name Servers: http://www.dnsinspect.com/gba.ge/1457300456

polonus

At the root of all this is the WordPress insecurity at this website, let’s have a look:
WordPress Version
2.22
Version does not appear to be latest 4.4.2 - update now.

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

revslider
g1-social-icons
simple-social-share 1.0 latest release (3.0) Update required
http://perials.com
g1-gmaps
eventON
contact-form-7 4.1.1 latest release (4.4) Update required
http://contactform7.com/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.

Warning User Enumeration is possible :o
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 edu. gba cache
2 None tiko
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Compromised sites will often contain embedded iframes that can also deliver malicious code to visitors of the web site. Check any discovered iframes and ensure they are legitimate.

-//www.facebook.com/plugins/likebox.php?href=https%3A%2F%2Fwww.facebook.com%2FGBAtrainingcenter&width=965&height=258&colorscheme=light&show_faces=true&header=false&stream=false&show_border=false&appId=275291799245613 seems OK here.

XSS Dom issues for this link: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.facebook.com%2Fplugins%2Flikebox.php%3Fhref%3Dhttps%253A%252F%252Fwww.facebook.com%252FGBAtrainingcenter%26width%3D965%26height%3D258%26colorscheme%3Dlight%26show_faces%3Dtrue%26header%3Dfalse%26stream%3Dfalse%26show_border%3Dfalse%26appId%3D275291799245613
landing at: -Results from scanning URL: https://static.xx.fbcdn.net/rsrc.php/v2/yq/r/0wM5s1Khldu.js
Number of sources found: 66
Number of sinks found: 20

This here seems 100 % OK - A-Status all = same origin: https://sritest.io/#report/58993912-57ac-402d-ad89-a709874ff27d

polonus (volunteer website security analyst and website error-hunter)

Seems VT does not have any threat detection listed. The vulnerability of the site remains however.

polonus