See: https://www.eff.org/https-everywhere/atlas/domains/uformia.com.html
F-status: https://securityheaders.io/?q=uformia.com
Check for updates: WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
Powered by Visual Composer.
photo-gallery latest release (1.2.93)
https://web-dorado.com/products/wordpress-photo-gallery-plugin.html
woocommerce latest release (2.5.5)
http://www.woothemes.com/woocommerce/
q2w3-fixed-widget latest release (4.0.6)
http://www.q2w3.ru/q2w3-fixed-widget-wordpress-plugin/
quick-pagepost-redirect-plugin latest release (5.1.7)
http://www.anadnet.com/quick-pagepost-redirect-plugin/
woocommerce-aelia-currencyswitcher
js_composer_salient
contact-form-7 latest release (4.4)
http://contactform7.com/
jQuery to be retired: -https://uformia.com
Detected libraries:
jquery-migrate - 1.2.1 : -https://uformia.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=b3df5d627d30a4500a3a4dab7a4014f1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery-mobile - 1.3.2 : -https://uformia.com/wp-content/plugins/photo-gallery/js/jquery.mobile.js?ver=b3df5d627d30a4500a3a4dab7a4014f1
jquery - 1.9.0 : -https://s3.amazonaws.com/downloads.mailchimp.com/js/mc-validate.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.11.3 : (active1) -https://uformia.com/wp-includes/js/jquery/jquery.js?ver=b3df5d627d30a4500a3a4dab7a4014f1
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery-ui-autocomplete - 1.11.4 : (active1) -https://uformia.com/wp-includes/js/jquery/ui/autocomplete.min.js?ver=b3df5d627d30a4500a3a4dab7a4014f1
jquery.prettyPhoto - 3.1.6 : (active1) -https://uformia.com/wp-content/themes/salient/js/prettyPhoto.js?ver=b3df5d627d30a4500a3a4dab7a4014f1
(active) - the library was also found to be active by running code
3 vulnerable libraries detected
nameserver vulnerable to DROWn: https://test.drownattack.com/?site=register.com
POODLE vulnerable: http://toolbar.netcraft.com/site_report?url=https://uformia.com
Issues should be addressed at/by RACKSPACE San-Antonio, Texas.
polonus (volunteer website security analsyst and website error.hunter)