Note: The URL(s) listed above have been found in the page you are checking. While the URL(s) are not currently flagged as suspicious by Google they have returned malicious content, unwanted software, deceptive content, and/or caused problems recently and should be investigated. Do they belong in your page?
***
52:
"javascript" type="text/javascript" src="hxxp://js.users.51.la/19099393.js"
Note: The script call above looks suspicious! Check to make sure it is legit.
while this is adding to the gravity of the situation: https://sritest.io/#report/76d2b13d-cfb8-4844-89ad-bb6d2d73fba1
Then we have a custom error:Fail and two warnings here: https://asafaweb.com/Scan?Url=72b668.com
Potentially dangerous files
.apk Detected - Name Servers Allow TCP Connections Failed Found name servers which don’t allow TCP connections
-juming.dnsdun.com
polonus (volunteer website security analyst and website error-hunter)
info: [decodingLevel=0] found JavaScript
error: undefined variable Image
error: ./pre.js:249: TypeError: Image is not a constructor
info: [decodingLevel=1] found JavaScript
error: line:6: TypeError: Image is not a constructor</blockquote> and dowload from it <blockquote>/eval a2109img = new Image;a2109img.src=a2109src; //document.write (s) <a href="httxs://www.51.la/?19062109" target="_blank" title="-51.La 网站流量统计系统">网站统计</a> </blockquote>Also see: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=js.users.51.la%2F19062109.js&ref_sel=GSP2&ua_sel=ff&fs=1
-js.users.51.la/18770492.js benign
saved 6760 bytes 83025ac1927f410ebc04a4a75bdc9eaa898e1118
info: [decodingLevel=0] found JavaScript
error: undefined variable Image
error: ./pre.js:249: TypeError: Image is not a constructor
info: [decodingLevel=1] found JavaScript
error: line:6: TypeError: Image is not a constructor
file: 83025ac1927f410ebc04a4a75bdc9eaa898e1118: 6760 bytes
file: afc861a3136fc0cd38b7ec91cc29c85164bd87aa: 246 bytes
Excessive header warning: The address you entered is unnecessarily exposing the following response headers which divulge its choice of web platform:
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
Configuring the application to not return unnecessary headers keeps this information silent and makes it significantly more difficult to identify the underlying frameworks.
Overview
Cookies not flagged as “HttpOnly” may be read by client side script and are at risk of being interpreted by a cross site scripting (XSS) attack. Whilst there are times where a cookie set by the server may be legitimately read by client script, most times the “HttpOnly” flag is missing it is due to oversight rather than by design.
Result
It looks like 3 cookies are being set without the “HttpOnly” flag being set (name : value):
WsEw_9831_lastvisit : 1515501518
WsEw_9831_sid : FB712w
WsEw_9831_lastact : 1515505118%09index.php%09list
Unless the cookie legitimately needs to be read by JavaScript on the client, the “HttpOnly” flag should always be set to ensure it cannot be read by the client and used in an XSS attack.