And rightfully so, as Bitdefender’s TrafficLight blocks website as with viruses or malware.
Also here we find links to potentially suspicious links: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Fjahesh-security.org%2F&ref_sel=GSP2&ua_sel=ff&fs=1
1 → /cc/clientscript/vbulletin-core.js
2 → /cc/flatly/js/app.min.js
Here these are missed completely: https://www.virustotal.com/en/url/98158a0d88b6b4d3c3c56f2daba5679fa9c0457f06ed9981fea20908fda7bb2d/analysis/
DROWn vulnerable nameserver: https://test.drownattack.com/?site=ns6579.hostgator.com on defaced website: http://killmalware.com/barguide.com/# with a phishing script here: -http://suspended.hostgator.com/js/simple-expand.min.js
Re: http://www46.tium.co/jahesh-security.org
5 vulnerable jQuery libraries detected:
Detected libraries:
jquery - 1.8.3 : =http://jahesh-security.org/js/jquery.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.11.1 : (active1) =http://jahesh-security.org
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.11.1 : (active1)-http://jahesh-security.org
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.4.4 : -http://1abzar.ir/abzar/tools/slider2/1/jquery.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.4.4 : http://1abzar.ir/abzar/tools/slider2/1/jquery.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
5 vulnerable libraries detected
Scanner output: http://www.domxssscanner.com/scan?url=http%3A%2F%2F1abzar.ir%2Fabzar%2Ftools%2Fslider2%2F1%2Fjquery.js
Number of sources found: 84
Number of sinks found: 24
Re: http://www46.tium.co/%201abzar.ir doesn’t use HTTPS protocol.
Poor rep as hosted here: -http://hosted-by.hostdl.com/ → https://www.mywot.com/en/scorecard/hosted-by.hostdl.com?utm_source=addon&utm_content=warn-viewsc (reported as spammer).
polonus (volunteer website security analyst and website error-hunter)