Scanned: https://www.virustotal.com/en/url/274dbe8be40eabf4ff86cd1bf52dbcefad54c8045c17b22cc237d748c2b53359/analysis/1455392001/
Flagged here: http://killmalware.com/13-art.ru/# and at -https://13-art.ru/
Detected libraries:
jquery - 1.11.3 : -https://13-art.ru/wp-includes/js/jquery/jquery.js?ver=1.11.3
jquery-migrate - 1.2.1 : -https://13-art.ru/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
1 vulnerable library detected
See: http://phpxref.ftwr.co.uk/wordpress/nav.html?wp-includes/js/comment-reply.min.js.source.html
Code redirects to -http://услуги/ Website risk status 10 red out of 10: http://toolbar.netcraft.com/site_report?url=http://xn--c1akhxjc backlink.
5 malicious files detected at Quttera’s: http://quttera.com/detailed_report/13-art.ru
Severity: Malicious
Reason: Detected encoded JavaScript code commonly used to hide malicious behaviour.
Details: Detected malicious JavaScript code
See beyond
jQuery.noConflict();/*
and Potentially Suspicious files: 1
-mc.yandex.ru/metrika/watch.js
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details: Too low entropy detected in string [[‘:,:,:,:,:,:,:,:,0,0,:,:,:,:,:,:String.,:String.,:String.,:,:,:,:,:,:,0,:,:,:,:,:,:,:,:,:String.,:,:S’]] of length 170 which may point to obfuscation or shellcode.
SRI Stylesheet issue: Tag Result
Missing SRI hashWordPress security issues: see: https://hackertarget.com/wordpress-security-scan/
The following plugins were detected by reading the HTML source of the WordPress sites front page.
js_composer_theme
Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.
ID User Login
1 None lihoyplay_khfdh824
polonus