Our WebSite wxw.fooya.com has been marked as Phishing Site. Kindly remove it. I have checked with this tool https://www.urlvoid.com/scan/fooya.com/
there is nothing error in our site.
Kinldy remove it.
Our WebSite wxw.fooya.com has been marked as Phishing Site. Kindly remove it. I have checked with this tool https://www.urlvoid.com/scan/fooya.com/
there is nothing error in our site.
Kinldy remove it.
→ https://sitecheck.sucuri.net/results/www.fooya.com
→ https://www.virustotal.com/gui/url/f4a88e690c82a0184b0a053de3ad797a064a64374328c8ecb81251939c9e837f/detection
You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php
Thanks Avast For your reply.
I just have removed the suspicious link in my site. I check with scanner site. It is clean. So kindly un block my site.
Thanks and Regards
URL detection disabled.
thank you so much
Hi Avast Still now i cant login in my site. It says phishing . I have check with your website mentioned. I have attached image with it.
Kindly remove from phishing label. Do it needful.
Thanks n advance
Hi Karthi7,
July last this year 9 engines detected, see: https://www.virustotal.com/gui/ip-address/104.31.74.109/relations
Wait for an avast team member to give a final verdict, as they are the only ones to cone and unblock.
They might come here in the new week.
hint #1: ‘jQuery@1.11.3’ has 2 known vulnerabilities (2 medium). See ‘https://snyk.io/vuln/npm:jquery’ for more information. See:
jquery-migrate 1.2.1 Found in -https://fooya.com/js/jquery-migrate.min.js - Vulnerability info:
medium 11290 Selector interpreted as HTML
jquery 1.11.3 Found in -https://fooya.com/js/jquery.js - Vulnerability info:
medium 2432 3rd party CORS request may execute CVE-2015-9251
medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution
See security related recommendations for improvement:
https://webhint.io/scanner/d85a7c27-d3fa-4680-ba8e-5a1301d61d49#category-security
→ disown-opener: 13 hints; sri: 15 hints; strict-transport-security: 64 hints;
x-xontent-type-options: 59 hints. 8
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)