Found at VirusWatch: https://www.virustotal.com/en-gb/url/081b80aee6b105cc17b710d08af41bc96497e53f7258c80ab6af0e981f7cbe5f/analysis/1470145780/
Qutter’s flags domain as malicious, so blacklisted there.
GoDaddy Abuse: Web application details:
Application: WordPress 4.5.3
Web application version:
WordPress version: WordPress 4.5.3
WordPress theme: -http://www.vaune.com/wp-content/themes/wjtheme/
Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.
ID User Login
1 jenny jenny
2 Vaune vaune
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
What is being acquired should also later be retired: -http://www.vaune.com
Detected libraries:
jquery - 1.12.4 : (active1) -http://www.vaune.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
1 vulnerable library detected
Checked: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.vaune.com
Error:
script
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: line:3: SyntaxError: missing ) in parenthetical:
error: line:3: e(n.expando)}"script"===c&&b.text!==a.text?(Da(b).text=a.text,Ea(b)):"object"===c?(b.parentNode&&(b.outerHTML=a.outerHTML),l.html5Clone&&a.innerHTML&&!n.trim(b.innerHTML)&&(b.innerHTML=a.innerHTML)):"input"===c&&Z.test(a.type)?(b.defaultChecked=b.chec
error: line:3: .................
Something is being injected into the response that should not be there.
An issue with the theme could have caused this.
Three issues here, producing a C-Status for the website: https://sritest.io/#report/6fb6fce9-5180-4b7f-8c6c-c7aa36cca6ad
Went over the URI flagged for with this scan and then encountered: Note: It looks like your site has returned a 503 Error. In some cases the firewall or a bad bot utility will block the use of this tool. If the response is unexpected you should verify the response with another tool such as Rex Swain.
Service unavailable: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Fwww.vaune.com%2Fshop%2Fcart.php%3Ftarget%3Dmain&ref_sel=GSP2&ua_sel=ff&fs=1
And once again secureserver dot net issues as it has a bad web rep.
IP scan: https://www.virustotal.com/en-gb/ip-address/72.167.10.105/information/
SID session cloning performed here together with htacces malcode? Re: https://wordpress.org/support/topic/new-htaccess-malware-hack-anywone
polonus (volunteer website security analyst and website error-hunter)