Re: https://www.phishtank.com/phish_detail.php?phish_id=6655037&frame=details
Re: https://www.shodan.io/host/47.115.6.187
Retirable jQuery
jquery 3.3.1.min Found in -http://47.115.6.187/static/js/jquery-3.3.1.min.js
Vulnerability info:
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution 123
Medium Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Cloud is vulnerable: PHP, headers - 7.2.22 (various vulnerabilities found in PHP headers 7.2.22 update/upgrade to 7.5)
This website is flagged as insecure.
66% of the trackers on this site could be protecting you from NSA snooping. Tell to fix it.
All trackers
At least 3 third parties know you are on this webpage.
-image.paypay.ne.jp
-p.dmm.com
-47.115.6.187 -47.115.6.187
Tracker could be tracking safely if this site was secure.
JS errors: File not found: /js/Layerlogin.js
File not found: /js/login.js
TypeError: layer.iframe is not a function
/:841
XSS-DOM Number of sources found: 2
Number of sinks found: 161
Results from scanning URL: -http://47.115.6.187/static/js/header_02-1.js
Number of sources found: 3
Number of sinks found: 2
external link to: Results from scanning URL: -https://craillar.home.ktk.de/ (connection refused HTTP ERROR 500
→ https://www.shodan.io/host/212.7.160.132)
Number of sources found: 14
Number of sinks found: 3
and another pops up: Results from scanning URL: -https://damienmzmzm.slypage.com/ (connection refused)
Number of sources found: 2
Number of sinks found: 2
(https://www.shodan.io/host/142.147.105.39)
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)