Problematic files make that this defacer website better comes blocked!

And rightfully so, as Bitdefender’s TrafficLight blocks website as with viruses or malware.
Also here we find links to potentially suspicious links: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Fjahesh-security.org%2F&ref_sel=GSP2&ua_sel=ff&fs=1
1 → /cc/clientscript/vbulletin-core.js
2 → /cc/flatly/js/app.min.js
Here these are missed completely: https://www.virustotal.com/en/url/98158a0d88b6b4d3c3c56f2daba5679fa9c0457f06ed9981fea20908fda7bb2d/analysis/
DROWn vulnerable nameserver: https://test.drownattack.com/?site=ns6579.hostgator.com on defaced website: http://killmalware.com/barguide.com/# with a phishing script here: -http://suspended.hostgator.com/js/simple-expand.min.js

Re: http://www46.tium.co/jahesh-security.org

5 vulnerable jQuery libraries detected:
Detected libraries:
jquery - 1.8.3 : =http://jahesh-security.org/js/jquery.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.11.1 : (active1) =http://jahesh-security.org
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.11.1 : (active1)-http://jahesh-security.org
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.4.4 : -http://1abzar.ir/abzar/tools/slider2/1/jquery.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.4.4 : http://1abzar.ir/abzar/tools/slider2/1/jquery.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
5 vulnerable libraries detected

Scanner output: http://www.domxssscanner.com/scan?url=http%3A%2F%2F1abzar.ir%2Fabzar%2Ftools%2Fslider2%2F1%2Fjquery.js
Number of sources found: 84
Number of sinks found: 24

Re: http://www46.tium.co/%201abzar.ir doesn’t use HTTPS protocol.
Poor rep as hosted here: -http://hosted-by.hostdl.com/https://www.mywot.com/en/scorecard/hosted-by.hostdl.com?utm_source=addon&utm_content=warn-viewsc (reported as spammer).

polonus (volunteer website security analyst and website error-hunter)