Persistent insecurity of website after a Feedify injection, or still vulnerable?

Where we found some hundreds of examples, that became at one time infested,
at this research website: https://publicwww.com/websites/"feedbackembad-min-1.0.js"/

And now sometimes again were given the all green: https://sitecheck.sucuri.net/results/https/sscportal.in

Picked one to see about website’s security now: https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=c3NecF19dHxsLltuYA%3D%3D~enc

checked against VT detections on domain (on Android, via PDF files etc.): https://www.virustotal.com/#/domain/sscportal.in

And vulnerablities given at IP resource via: https://www.shodan.io/host/101.53.137.137

See recent reports: https://urlquery.net/report/346252cf-5d0d-482d-a8a0-8fa997a77aaa

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

Another weak Word Press site with outdated software: https://sitecheck.sucuri.net/results/en.macrothink.org
Detected library: https://retire.insecurity.today/#!/scan/430b8021af24252949921f89adcac27390979319443338a29a22d9167db4a0eb
Found via a scan like: https://publicwww.com/websites/wp-slimstat.min.js/ (with an earlier XSS-DOM vulnerability);
Further XSS-DOM issues: at -http://en.macrothink.org/wp-content/plugins/jquery-mega-menu/js/jquery.dcmegamenu.1.3.4.min.js?ver=3.5.1 Number of sources found: 43 ; number of sinks found: 20

Server vulnerabilities: https://httpd.apache.org/security/vulnerabilities_22.html
and quite some for linode at Fremont, see: https://www.shodan.io/host/173.255.254.177

Is there PHISHing going on or not, see: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=bFsyODAtMTc3Lm17bWJ7fXMubFtuXSN7Ll5dbWA%3D~enc

[quote] null → The URL http://li280-177.members.linode.com/ is NOT currently flagged. [/url]

polonus