Clean website with vulnerable CMS....

See: http://killmalware.com/widmerlawoffice.com/
See: https://www.virustotal.com/nl/url/50f9203838dbbd4e23ad8a7024317cb7b8b93566977a87347584f29725ab3118/analysis/1457484466/
-http://widmerlawoffice.com
Detected libraries:
jquery-migrate - 1.2.1 : -http://www.widmerlawoffice.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : -http://www.widmerlawoffice.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
jquery.prettyPhoto - 3.1.4 : -http://www.widmerlawoffice.com/wp-content/themes/widmer/javascript/jquery.prettyPhoto.js?ver=1.0
Info: Severity: high
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6837&cid=3
Info: Severity: high
https://github.com/scaron/prettyphoto/issues/149
https://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto
2 vulnerable libraries detected and again we saw /jquery-migrate.min.js?ver=1.2.1 to enhance the code risk status.

WordPress issue: Warning User Enumeration is possible :o
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 None
2 alexamedia alexamedia
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.