polonus
11
The code is malcious only if an attacker has sneaked in a (spoofing) backdoor into the code.
Read: http://stopmalvertising.com/security/phpthumb-fltr-command-injection-vulnerability-exploit-scans.html link author = Kimberly
Is that the case here?
Then it should reside here: commonscripts. dot om/js/audioplayer/js/jquery-1.6.1.min.js benign
[nothing detected] (script)commonscripts dot com/js/audioplayer/js/jquery-1.6.1.min.js
status: (referer=wXw.pvcc.org/)saved 91342 bytes 6fca78dac2797c02d86a4bf6514eda398b7dbe62
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined function a.getElementsByTagName
error: undefined variable a
suspicious: avast! Web Shield alerts HTML:Script-inf
See: https://urlquery.net/report.php?id=6847009
See: http://anubis.iseclab.org/?action=result&task_id=14caf53c8e70b79543dc711a44c2620f1&format=html
polonus