CMS issue and malware flagged - avast do not alert!

Re: https://urlquery.net/report/e1e0af3d-8acd-4114-8792-158a02e8eb44
Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 None simon
2 None bjoern

jQuery libarary vuln. http://retire.insecurity.today/#!/scan/b70f94fe03daca2535f034ced836838204ab1631cbd945a1ce33c7c0f7e27a8d
Subresource Integrity (SRI) not implemented, but all scripts are loaded from a similar origi

Fortinet malicious site. Found differences in TXT records returned by your name servers.
Also consider: http://toolbar.netcraft.com/site_report?url=http://mail-am5eur020138.inbound.protection.outlook.com

https://www.threatcrowd.org/domain.php?domain=www.big-service.de

F-grade status: https://securityheaders.io/?followRedirects=on&hide=on&q=www.big-service.de

http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.big-service.de

for Results from scanning URL: -http://www.big-service.de/wp-content/cache/minify/d6a42.js
Number of sources found: 26
Number of sinks found: 7

[iframe] about:blank info: [decodingLevel=0] found JavaScript error: undefined variable Element error: undefined variable t suspicious: maxruntime exceeded 10 seconds (incomplete)

polonus (volunteer website security analyst and website error-hunter)