References found on Virus Total may contain live malware
Results from scanning URL: -https://www.kurina.vip
Number of sources found: 207
Number of sinks found: 352
It’s showing Phishing because of IP address, later I moved website to another server. Now everything is okay but still because of old IP address it shows Phishing warning by Avast.
User Enumeration
The first two user ID’s were tested to determine if user enumeration is possible.
Username Name
ID: 1 admin admin
ID: 2 not found
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. Take note that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
Hello, avast has added our site to the blacklist. I don’t know how long this has been. There is nothing negative about the site. I left a record to be removed from the blacklist but no response. What should I do? site: snewstr.com
However the following retire.js library issues should be looked into:
bootstrap 3.3.7 Found in -https://level2.webhmi.com.ua/public/js/libs/bootstrap.js?85a31cf4 _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331 1
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042
Medium XSS is possible in the data-target attribute. CVE-2016-10735
handlebars 4.0.11 Found in -https://level2.webhmi.com.ua/public/js/main.js?0952e4e0 _____Vulnerability info:
High A prototype pollution vulnerability in handlebars is exploitable if an attacker can control the template
High A prototype pollution vulnerability in handlebars is exploitable if an attacker can control the template
Low Disallow calling helperMissing and blockHelperMissing directly
Medium Prototype pollution
jquery 1.10.2.min Found in -https://level2.webhmi.com.ua/assets/js/vendor/jquery-1.10.2.min.js _____Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution 123
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
moment.js 2.15.1 Found in -https://level2.webhmi.com.ua/public/js/libs/moment.js?6a270a2f _____Vulnerability info:
Medium Regular Expression Denial of Service (ReDoS)
Low Regular Expression Denial of Service (ReDoS) CVE-2017-18214
pozdrawiam,
polonus (volunteer 3rd party cold recon website security-analyst and website error-hunter)
Good afternoon, my site http://бупик.рф / was blacklisted, at the moment the site is completely cleaned, I ask you to assist in excluding it from the blacklist.
Aside from this, there are lots of things you need to address to improve security. Outdated software and security issues could put your site at risk:
Security issues reported here - https://en.internet.nl/site/newsnet.ro/1709938/
Hello.
The domain of our company (https://www.twilead.com) was added to the blacklist for no known reason except a breach in our security last June where someone could create a fake account on our platform and sent some phishy-looking emails. We have right away identified the issue, banned the user and hardened our security which makes it totally impossible to do so again ever since. Btw Other sites are fine.
Could you please remove us from blacklist and recategorize us as “marketing software” or “business cloud apps” ?
Thank you!!