Hi versus2,
Apart form Eddy’s advice, there is room for some general improvement on the website code as well.
Try to generate the appropriate SRI hashes for the two issues seen here: https://sritest.io/#report/aadb2907-42bf-4fe8-8fba-e2212d9861a5
Consider the issues with the F-status scan here: https://observatory.mozilla.org/analyze.html?host=filigrana-spb.ru
The implications of these scan results: http://www.domxssscanner.com/scan?url=http%3A%2F%2Ffiligrana-spb.ru
in relation to these finds of retirable jQuery code: http://filigrana-spb.ru
Detected libraries:
jquery - 1.6.4 : -http://filigrana-spb.ru/js/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery.prettyPhoto - 3.1.6 : -http://filigrana-spb.ru/js/jquery01.js
swfobject - 2.2 : -http://filigrana-spb.ru/js/swfobjec.js
jquery-ui-dialog - 1.10.2 : -http://filigrana-spb.ru/js/jquery-ui-1.10.2.custom.min.js
jquery-ui-autocomplete - 1.10.2 : -http://filigrana-spb.ru/js/jquery-ui-1.10.2.custom.min.js
jquery-ui-tooltip - 1.10.2 : -http://filigrana-spb.ru/js/jquery-ui-1.10.2.custom.min.js
To further support Eddy’s findings on the web server security, these test results to consider,
F-status: https://www.htbridge.com/websec/?id=c94309e85435257890bf9faba4012533433cb1e359cf4b7eefb5b3ff8c6a59e2
Version info proliferation is at the core of the problems for this aspect of the security test.
polonus (volunteer website security analyst and website error-hunter)