Flagged four times: https://www.virustotal.com/nl/url/e4ae64b9c8a3c6e0519199ec33b9fdc6e03e53e5d875d0fe4d246c44bdefdb16/analysis/1446118763/
List of blacklisted external links: 5
-bayparkfooddrive.com//cgi-sys/js/simple-expand.min.js
-bayparkfooddrive.com/mailto:maryann@frontlinerealtygroup.com
-bayparkfooddrive.com/#
-bayparkfooddrive.com//a
-bayparkfooddrive.com//cgi-sys/images/x.png
Given as a dangerous website here: https://www.google.com/transparencyreport/safebrowsing/diagnostic/index.html#url=www.bayparkfooddrive.com
WordPress scan: The following plugins were detected by reading the HTML source of the WordPress sites front page.
Insecurity: Warning Directory Indexing Enabled → emailbuddy
JQuery insecurity - vulnerable: jquery-migrate - 1.2.1 : -http://bayparkfooddrive.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium → jquery - 1.11.3 : (active1) -http://bayparkfooddrive.org/wp-includes/js/jquery/jquery.js?ver=1.11.3
See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fbayparkfooddrive.org%2Fwp-includes%2Fjs%2Fjquery%2Fjquery-migrate.min.js%3Fver%3D1.2.1
landing at: -http://creatinablog.org/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/cookie-law-info/js/cookielawinfo.js,wp-content/themes/schema/js/customscript.js,wp-content/plugins/wp-seo-images/assets/js/admin.js
and more insecurity there: Detected libraries:
jquery - 1.11.3 : -http://creatinablog.org/wp-content/cache/autoptimize/js/autoptimize_33d36c5e449bc8e697c4f3b33b1a3658.js
jquery-migrate - 1.2.1 : -http://creatinablog.org/wp-content/cache/autoptimize/js/autoptimize_33d36c5e449bc8e697c4f3b33b1a3658.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
1 vulnerable library detected
(active) - the library was also found to be active by running code
Also consider: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fbayparkfooddrive.org%2Fwp-includes%2Fjs%2Fjquery%2Fjquery-migrate.min.js%3Fver%3D1.2.1
landing here: -http://etractorsforsale.com/wp-content/plugins/simply-instagram/js/jquery.tooltipster.min.js etc.
Further vulnerabilties there: -http://etractorsforsale.com
Detected libraries:
jquery - 1.7.1 : (active1) -https://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
swfobject - 2.2 : -http://etractorsforsale.com/wp-includes/js/swfobject.js
jquery.prettyPhoto - 3.1.6 : -http://etractorsforsale.com/wp-content/plugins/simply-instagram/js/simply-instagram-jquery.prettyPhoto.js
jquery.prettyPhoto - 3.1.5 : (active1) -http://etractorsforsale.com/wp-content/plugins/wp-flicker/scripts/jquery.prettyPhoto.js
Info: Severity: high
https://github.com/scaron/prettyphoto/issues/149
https://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto
(active) - the library was also found to be active by running code
2 vulnerable libraries detected
polonus (volunteer website security analyst and website error-hunter)