Blacklisted website - unknown_html_RFI_shell detected...

https://www.virustotal.com/en/url/336ec545881f7bae087c1d236cc457fdb2716260d5e64206937140dbb1ec824e/analysis/1454012625/
See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fblastronhileleri.blogspot.com.tr%2Fsearch%2Flabel%2Fblastront%2F
See: https://urlquery.net/report.php?id=1454012804943 (no alerts)…
2 warnings: https://asafaweb.com/Scan?Url=blastronhileleri.blogspot.com.tr
-http://blastronhileleri.blogspot.com.tr
Detected libraries:
jquery - 1.5.2 : (active1) -http://ajax.googleapis.com/ajax/libs/jquery/1.5.2/jquery.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.7.1 : -http://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected

website risk status 7 red out of 10: http://toolbar.netcraft.com/site_report?url=http%3A%2F%2Fblastronhileleri.blogspot.com.tr%2Fsearch%2Flabel%2Fblastront%2F

18 potentially suspicious files with Severity: Potentially Suspicious
Reason: Suspicious JavaScript code injection.
Details: Procedure: replace has been called with a string containing hidden JavaScript code .

[[<script type='text/javascript' language='javascript' >   var thumbnail_mode = "no-float"  

Cannot find external link for -http://kangismet.googlecode.com/files/jquery-ui.min2.js

[quote]If the slider has stopped working, please replace with

Google throws in SWBPL threat detected…

polonus

Blocked by Avast: http://prntscr.com/9w3s3q

Hi Steven Winderlich,

Good we have detection for this, and anyway we also know the background of that detection now from above analysis,

polonus