See: https://www.virustotal.com/nl/url/b8e8f6df296884b56c3c29d3ede2c967123fb338f70f435cba5d362e48a965bf/analysis/1427062302/
Flagged here: http://sitecheck.sucuri.net/results/bugtime.net
Web application version:
WordPress version: WordPress
Wordpress Version 3.8.0 based on: htxp://bugtime.net/wp-admin/js/common.js
All in One SEO Pack version: 2.2.5.1
WordPress theme: htxp://bugtime.net/wp-content/themes/bugtime-V2/
Wordpress internal path: /home/bug2000/public_html/wp-content/themes/bugtime-V2/index.php
WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress Under 4.0
name server versions are exposed: http://www.dnsinspect.com/bugtime.net/1427062814
Other vuln.see: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fbugtime.net
For instance see: http://stackoverflow.com/questions/4350588/setattribute-and-xss
in prettyPhoto Use: Lightbox clone for jQuery → http://stackoverflow.com/questions/12095655/bind-unbind-event-after-intial-prettyphoto-open-funcation-is-run
pol