Avast does not flag website infested with Trojan.HTML.Agent.hd

See: https://www.virustotal.com/nl/url/b99ea49ba9115796c4c239bf039eeb0f548101066cce515af0f40dc27bd3fb94/analysis/1444770543/
See: https://www.virustotal.com/nl/file/ffddbede596404573f0e8249e3d5f40f4b40e804193346b1e82a4eaf6be31426/analysis/1444687644/
Given as malware infested here: https://urlquery.net/report.php?id=1444770758861
Site potentially harmful, also blacklisted: http://www.phishtank.com/phish_detail.php?phish_id=3348346
Given clean: http://zulu.zscaler.com/submission/show/1277bbafbe5730241232b6393ef6ac06-1444770884

Outdated CMS: WordPress Version
4.2.4
Version does not appear to be latest 4.3.1 - update now.

The following plugins were detected by reading the HTML source of the WordPress sites front page.

slider-wd 1.0.15 latest release (1.0.45) Update required
https://web-dorado.com/products/wordpress-slider-plugin.html
woocommerce 2.3.8 latest release (2.4.7) Update required
http://www.woothemes.com/woocommerce/
contact-form-email 1.0 latest release (1.2) Update required
ultimate-social-media-plus 1.4 latest release (1.9) Update required
http://ultimatelysocial.com
wpclef 2.3.0 latest release (2.3.1) Update required
http://wordpress.org/extend/plugins/wpclef
templatesnext-toolkit 1.1.3 latest release (1.1.4) Update required
gallery-images 1.3.5 latest release (1.6.3) Update required
http://huge-it.com/wordpress-gallery/
carousel-horizontal-posts-content-slider 3.2.5 latest release (3.2.5)
http://wordpress.org/plugins/carousel-horizontal-posts-content-slider/
wp-responsive-thumbnail-slider latest release (1.0)
http://www.i13websolution.com/wordpress-responsive-thumbnail-slider-pro.html

WordPress Theme
The theme has been found by examining the path /wp-content/themes/ theme name /

Incart Lite 1.0.5 http://www.sketchthemes.com/themes/incart-responsive-woocommerce-wordpress-theme/

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 None admin
2 None editor
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Also consider: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.hip-pet.com%2F%2Fwp-includes%2Fjs%2Fautosave.js landing here: http://pozabankowe24h.pl/wp-content/themes/the-box/js/small-menu.js?ver=20120206 which is insecure because of outdated software found up there:
HTTP Server: Apache HTTP Server 2.2.29
mod_fcgid Version: 2.3.10
mod_wsgi Version: 3.1 (Outdated)
Operating System: Unix
Phusion Passenger Version: 2.2.15 (Outdated)
Python Version: 2.5.5 (Outdated)
OpenSSL Version: 0.9.8o (Outdated)

polonus (volunteer website security analyst and website error-hunter)

Further insecurities on landing site detected.
Website’s WordPress Version
3.8.11
Version does not appear to be latest 4.3.1 - update now.

Extensive Server header info proliferation detected:
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8o DAV/2 mod_python/3.3.1 Python/2.5.5 mod_fastcgi/2.4.6 mod_wsgi/3.1 mod_fcgid/2.3.10-dev Phusion_Passenger/2.2.15
X-Powered-By: None

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

cforms2 latest release (14.9.13)
https://wordpress.org/plugins/cforms2/

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 None admin
2 None

polonus