See: https://www.virustotal.com/nl/url/d7c45dd8d38d20396a0de171f2a202e3b0097430f5c2da48440541cc7cbeace2/analysis/1449160365/
See: index.html
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details: Too low entropy detected in string [[‘%3Chtml%20xmlns%3D%22http%3A//wXw.w3.org/1999/xhtml%22%3E%0A%20%3Chead%3E%3C/head%3E%0A%20%3Cbody%20’ etc etc. ]] of length 12584 which may point to obfuscation or shellcode.
Blocked: Suspected XSS Attack
Blocked URL: -https://www.google.nl/search?q=<script+type%3D'text%2Fjavascript'+language%3D'javascript'+>+<! etc. etc.
List of scrripts included: -http://s95.cnzz.com/z_stat.php?id=1256556506&web_id=1256556506
该网站含有大量未经证实的信息,访问含有欺诈内容的网站可能会给您造成财产损失,请您谨慎访问。
Be cautious as site has a lot of fraudulous information that could be damaging…(translation)
Custom error: Fail and warnings: https://asafaweb.com/Scan?Url=23cpa.com
Vulnerable library on website that should be retired asap:
-http://23cpa.com/
Detected libraries:
jquery - 1.8.3 : (active1) -http://23cpa.com/js/jquery-1.8.3.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
1 vulnerable library detected
External link destination that should be blocked and is so for me:
uMatrix has prevented the following page from loading:
-http://s95.cnzz.com/z_stat.php?id=1256556506&web_id=1256556506
polonus (volunteer website security analyst and website error-hunter)