I do not see the site htxps://www.clien.net/service/ no longer detected by Avast’s.
But this needs your attention: findings by Retire.Js (script libraries vulnerable and so to be retired)
jquery-ui 1.12.1 Found in -https://www.clien.net/service/js/lib/jquery-ui.min.js _____Vulnerability info:
medium XSS when refreshing checkboxes if usercontrolled data in labels 2101 CVE-2022-31160 GHSA-h6gj-6jjq-h8g9
medium CVE-2021-41184 XSS in the of
option of the .position()
util GHSA-gpqq-952q-5327
medium CVE-2021-41183 15284 XSS Vulnerability on text options of jQuery UI datepicker GHSA-j7qv-pgf6-hvh4
medium CVE-2021-41182 XSS in the altField
option of the Datepicker widget GHSA-9gj3-hwp5-pmwc
medium CVE-2022-31160 XSS when refreshing a checkboxradio with an HTML-like initial text label GHSA-h6gj-6jjq-h8g9
jquery 1.11.1.min Found in -https://www.clien.net/service/js/lib/jquery-1.11.1.min.js _____Vulnerability info:
medium 2432 3rd party CORS request may execute CVE-2015-9251 GHSA-rmxg-73gg-4p98
medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers GHSA-rmxg-73gg-4p98
medium CVE-2019-11358 4333 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution GHSA-6c3j-c64m-qhgq
medium CVE-2020-11022 4642 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS GHSA-gxr4-xjj5-5px2
medium CVE-2020-11023 CVE-2020-23064 4647 passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery’s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. GHSA-jpcq-cgw6-v4j6 1
low 73 jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates
No cloaking detected - Given the all clean here: https://quttera.com/detailed_report/www.clien.net
Blocked for me was hxtps://clcommunications-d.openx.net/w/1.0/jstag?nc=44950606-www.clien.net because of -||openx.net^
Dr.Web strongly advises you against visiting this website
Dr.Web Link Checker prevents you from following the advertising link to ensure your privacy.
If you still want to open the page, select Use Incognito mode
Hints Security found up: Disallowed HTTP header - 73 warnings; vulners libraries (see earlier) 1 error - 2 warnings;
Use subresource integrity - 2 errors; vald- "Set Cookie-header"1 error, 1, warning; Use X-Control-Type-Options - 11 errors.
polonus (volunteer 3rd-party cold-reconnaissance website security-analyst and website error-hunter)