See: https://www.virustotal.com/nl/url/638de28e0beb96e975f8376450a8cde3c0e90387d0f53c72371e727fcc9ac195/analysis/1422023708/
and Outdated Web Server Apache Found
Vulnerabilities on Apache 2.4 Apache/2.4.7 → http://sitecheck.sucuri.net/results/kamber.com.au
Web application version:
WordPress version: WordPress
Wordpress Version 3.8 for: htxp://kamber.com.au/wp-includes/js/wp-ajax-response.js
All in One SEO Pack version: 2.2.4 (Known to be vulnerable in a sense)
RevSlider version: 4.6.0 (Is this version not exploitable?)
WordPress theme: http://kamber.com.au/wp-content/themes/flexform/
Outdated Web Server Apache Found: Apache/2.4.7
Peter Kleissner’s Virus Tracker results: kamber.com dot au,54.79.50.218,ns3.thinktanksocial.com dot au,Parked/expired,
IP detects all through CRDF: https://www.virustotal.com/nl/ip-address/54.79.50.218/information/
Blacklisted by Quttera’s
-www.slideshare.net
-www.searchenginejournal.com
-kamber.com.au and from there 76 blacklisted external links.
PHP vulnerable, sanitization not sufficient: htxp://www.exploit-db.com/download/34273/
Also read: https://github.com/offensive-security/exploit-database/blob/master/platforms/multiple/remote/29573.xml
this for htxp://wellformedweb.org/CommentAPI/ Extension Feed 1.3.9 is vulnerable!
Look here: http://jsunpack.jeek.org/?report=3e939511515b7a99e07e15c6e67b7d8fee568c2a
For security researchers only, open link with NoScript active and browser in a VM/sandbox.
Security Header Configuration, see: https://www.uploady.com/#!/download/M46I3JCoBFV/JHGXAQJxuQHbOgZk
polonus (volunteer website security analyst and website error-hunter)