See: https://www.virustotal.com/url/cb9241bb030ff239f5c36f5c9f1ea18f4070f8c6de128a53fc64a7f858d73d81/analysis/1359556270/
Nothing here, but see site history: http://urlquery.net/report.php?id=891062
The location line in the header above has redirected the request to: news.php
Suspicious? /infusions/hsgallery_panel/highslide/highslide.js
Severity:
Potentially Suspicious
Reason:
Detected potentially suspicious content.
Details:
Detected potentially suspicious initialization of function pointer to JavaScript method eval __tmpvar208717131 = eval;
Threat dump: see attached image
21442
File type:
ASCII
MD5:
E7AC12FD5D31B3975F0D9836807A00F8
undefined variable VK
error: undefined variable API_ID
error: undefined function VK.init
error: line:3: SyntaxError: missing = in XML attributeā¦
But sure site is a PHISH: http://www.phishtank.com/phish_archive.php?page=558
Site vulnerable to PHP software end of life vulnerabilities: http://www.cvedetails.com/vulnerability-list/vendor_id-2170/Php-Fusion.html
SQL injection via news.PHP
polonus