Open anynomous proxy detected, website vulnerable...

See IP: http://www.liveipmap.com/199.116.252.187
The following plugins were detected by reading the HTML source of the WordPress sites front page.

google-analyticator 6.4.9.6 latest release (6.4.9.6)
http://www.videousermanuals.com/google-analyticator/ Up to date…
The theme has been found by examining the path /wp-content/themes/ theme name /

Canvas 5.1.3http://www.woothemes.com/

Warning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/ enabled

PHP Version: 5.3.29 (Outdated)

Detected libraries:
jquery-migrate - 1.2.1 : -http://tuchambelan.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : (active1)-http://tuchambelan.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
(active) - the library was also found to be active by running code
1 vulnerable library detected

Landing at: URL: -http://gethealthynow.biz/ Possibly a PHISH: http://scanurl.net/?u=gethealthynow.biz
Website grader tool score: http://ninjaemails.com/website-grader/site/gethealthynow.biz

polonus

About the outdated PHP version and CMS. CMS will continue to support PHP 5.3 for as long as it’s possible. This means that they’ll drop PHP only if this is a requirement to supporting a future version of PHP or when they can no longer run PHP 5.3 on their test servers.

Just as there should not be excessive header info spread even when older versions given while updated, upgraded and with all patches enabled. What is reported are misconfiguration issues, info that could pose an eventual threat in the hands of so-called script kiddies.

polonus