-http://uzhayol.pp.ua is in Dr.Web malicious sites list!
At least website has vulnerable code: -http://uzhayol.pp.ua
Detected libraries:
jquery - 1.7.1 : (active1) -http://uzhayol.pp.ua/js/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
1 vulnerable library detected
Also see: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fuzhayol.pp.ua
Consider: http://www.herdprotect.com/ext.js-b6071d1796644770dd5db73e81334340514c36d0.aspx
Sucuri does not flag. Quttera flags 81 blacklisted external links, e.g.:
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fuzhayol.pp.ua%2F%2F%3Fq%253D%25d0%2593%25d0%25be%25d1%2580%25d0%25be%25d0%25b4%25d1%2581%25d0%25ba%25d0%25be%25d0%25b9%2B%25d1%2582%25d0%25b0%25d1%2580%25d0%25b8%25d1%2584%2B%2528%25d0%259c%25d0%25b0%25d1%2580%25d0%25b8%25d0%25bd%25d0%25b8%25d0%25bd%25d0%25b0%2B%25d0%2590%25d0%25bb%25d0%25b5%25d0%25ba%25d1%2581%25d0%25b0%25d0%25bd%25d0%25b4%25d1%2580%25d0%25b0%2529%2B%2B%25282015%2529%26id%253D4747320
External link inside script: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fapi9.net%2Fs%2FE0g0Uk3p.js%3Fsub_id%3D2115%26sub_id2%3D81%26sub_id3%3D1
landing here unencrypted: RichPays - Революционная монетизация мобильного… padlock icon
richpays.com
Alerts (1)
Insecure login (1)
Password will be transmited in clear to -http://richpays.com/dealers/sign_in (via -http://api9.net/
Infos (1)
Encryption (HTTPS) (1)
Communication is NOT encrypted
With AOS we are being protected!
polonus