The below Javascript was flagged as JS:Agent-PV [Trj], however the provider of this JS is a trusted partner and we suspect this is a false positive. Is there any clarification that can be given here?
Many thanks.
Removed the actual code, here is a link (though this may rotate and change), and screenshot attached:
As Pondus says remove script code immedeately or present it as an image link. If the malcode is not a FP, it is a spyware TT-exploit, and especially dangerous when opened with Internet Explorer,
This asp site certainly has some server security issues as you can view here: https://asafaweb.com/Scan?Url=www.alicepaul.org%2Falicepaul.htm
Custom errors are not correctly configured ; by default, excessive information about the server and frameworks used by an ASP.NET application are returned in the response headers. These headers can be used to help identify security flaws which may exist as a result of the choice of technology exposed in these headers; it doesn’t look like an X-Frame-Options header was returned from the server which means that this website could be at risk of a click-jacking attack.
Earlier malware from IP: http://support.clean-mx.de/clean-mx/viruses?id=8678620
A pinpoint evaluation was blocked by avast shield detection. JS:Agent-AYC[Trj],
If that was inserted into your JS files you must remove the code and search for the door which allowed the hacker to insert the code.
If you want to report a FP go here: www.avast.com/contact-form.php