Please release my company website. (Phishing site)

My company website is: hxtps://milton-exhibits.com
I am been blocked the infected url at htaccess which are found in virustotal on https://www.virustotal.com/gui/domain/milton-exhibits.com/relations.
01
hxtps://milton-exhibits.com/website/earthllnk/69a373fed4973cb3a3e7a510728e4899
02
hxtp://milton-exhibits.com/website/earthllnk/75c5c586fb642a959f79e4ae29e67572
03
hxtps://milton-exhibits.com/website/earthllnk/75c5c586fb642a959f79e4ae29e67572/CustomerBillingUpdate.htm
04
hxtp://milton-exhibits.com/website/earthllnk/69a373fed4973cb3a3e7a510728e4899
05
hxtps://milton-exhibits.com/website/earthllnk/69a373fed4973cb3a3e7a510728e4899/CustomerBillingUpdate.htm
06
hxtps://www.milton-exhibits.com/website/earthllnk/
07
hxtp://milton-exhibits.com/website/earthllnk/025cdcd368fba4d7f15ae831284c22e7/CustomerBillingUpdate.htm
08
hxtp://milton-exhibits.com/website/app_rackspace
09
hxtps://milton-exhibits.com/assets/images/home/j/nomade
10
hxtps://milton-exhibits.com/assets/images/home/h

Would you please release my company website? Thanks.

Report a false positive (select file or website)
https://www.avast.com/false-positive-file-form.php

https://forum.avast.com/index.php?topic=14433.msg1289438#msg1289438

Do not see the site being blocked. Has sacn problems - https://sitecheck.sucuri.net/results/milton-exhibits.com/website/earthllnk

Retirable jQuery libfraries: Retire.js
angularjs 1.3.11 Found in -https://milton-exhibits.com/themes/milton_exhibits/js/cdn/angular.min.js
Vulnerability info:
Medium The attribute usemap can be used as a security exploit
Medium Universal CSP bypass via add-on in Firefox
Medium DOS in $sanitize
Low XSS in $sanitize in Safari/Firefox
jquery 2.1.3 Found in -https://milton-exhibits.com/themes/milton_exhibits/js/cdn/jquery.min.js
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution

10 immediate threats threatening your website: https://webscan.upguard.com/#/https://milton-exhibits.com/en/index.html

Found through linting 314 recommendations for improvement:
https://webhint.io/scanner/7924919b-d0b9-4c3b-a882-d943940d847e

polonus (3rd party cold recon website security analyst and website error-hunter)

Error report

FATAL: terminating connection due to conflict with recovery DETAIL: User query might have needed to see row versions that must be removed. CONTEXT: PL/pgSQL function web_apis(text,text[],text[]) line 3603 at FOR over EXECUTE statement ERROR: server conn crashed? server closed the connection unexpectedly This probably means the server terminated abnormally before or while processing the request.

pol

Also blacklisted by Fortinet.