Our WebSite www.fooya.com has been marked as Phishing Site

Our WebSite wxw.fooya.com has been marked as Phishing Site. Kindly remove it. I have checked with this tool https://www.urlvoid.com/scan/fooya.com/

there is nothing error in our site.

Kinldy remove it.

https://sitecheck.sucuri.net/results/www.fooya.com
https://www.virustotal.com/gui/url/f4a88e690c82a0184b0a053de3ad797a064a64374328c8ecb81251939c9e837f/detection

You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php

Thanks Avast For your reply.

I just have removed the suspicious link in my site. I check with scanner site. It is clean. So kindly un block my site.

Thanks and Regards

URL detection disabled.

thank you so much

Hi Avast Still now i cant login in my site. It says phishing . I have check with your website mentioned. I have attached image with it.

Kindly remove from phishing label. Do it needful.

Thanks n advance

Hi Karthi7,

July last this year 9 engines detected, see: https://www.virustotal.com/gui/ip-address/104.31.74.109/relations

Wait for an avast team member to give a final verdict, as they are the only ones to cone and unblock.
They might come here in the new week.

For PHP see: https://www.cvedetails.com/vulnerability-list.php?vendor_id=74&product_id=128&version_id=298516&page=1&hasexp=0&opdos=0&opec=0&opov=0&opcsrf=0&opgpriv=0&opsqli=0&opxss=0&opdirt=0&opmemc=0&ophttprs=0&opbyp=0&opfileinc=0&opginf=0&cvssscoremin=0&cvssscoremax=0&year=0&cweid=0&order=1&trc=5&sha=bf50a40e5cae5f79210763b273e456da8b24ddb1

hint #1: ‘jQuery@1.11.3’ has 2 known vulnerabilities (2 medium). See ‘https://snyk.io/vuln/npm:jquery’ for more information. See:
jquery-migrate 1.2.1 Found in -https://fooya.com/js/jquery-migrate.min.js - Vulnerability info:
medium 11290 Selector interpreted as HTML
jquery 1.11.3 Found in -https://fooya.com/js/jquery.js - Vulnerability info:
medium 2432 3rd party CORS request may execute CVE-2015-9251
medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution

See security related recommendations for improvement:
https://webhint.io/scanner/d85a7c27-d3fa-4680-ba8e-5a1301d61d49#category-security
→ disown-opener: 13 hints; sri: 15 hints; strict-transport-security: 64 hints;
x-xontent-type-options: 59 hints. 8

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)