Hi Guys, I have taken over as the webmaster of wxw.hotline40.com.au and it was on a server riddled with issues. It now has a new server and completely new site and is fine but I think the domain is black listed. Keeps coming up as a phishing site, which I am sure it was a while ago. Can you please assist?
Your site kicks up a 403 error on Nginx 1.14.1 at Bluehost; take tis up with them and Google’s DB.
Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.
Consider: https://urlquery.net/report/d9651faf-c1c8-494f-bb90-27b60c567f42
Note! The scan has detected URL(s) from your site and/or IP in Phishing DBs -
This link Flagged URL(s)? will open a utility that will list out any URL(s) from your domain that are listed in Phishing DBs and tell you if Google is currently flagging the URL. null -> The URL -http://www.hotline40.com.au/ is NOT currently flagged.
This utility has found some URL(s) from your site and/or IP in Phishing DBs -
For some tips on clearing a Phishing hack and getting the Google warning removed see: Remove a phishing or web forgery warning
Note: Google’s flagging and review process is independent of the data contained in these DBs, sometimes you will find a URL marked NOT flagged now, will be flagged in a few hours, sometimes URL(s) get added to the DBs, so check back! You will also find once you get your site cleared by Google the URL(s) may linger in these DBs.
on IP - Forbidden
You don’t have permission to access / on this server.
Server unable to read htaccess file, denying access to be safe
Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.
Apache Server at -67-20-88-101.unifiedlayer.com Port 80
Still get a phishing alert via an avast aos-warning,
Note! The scan has detected URL(s) from your site and/or IP in Phishing DBs -
This link Flagged URL(s)? will open a utility that will list out any URL(s) from your domain that are listed in Phishing DBs and tell you if Google is currently flagging the URL.
For some tips on clearing a Phishing hack see: https://aw-snap.info/articles/phishing.php
Also consider retirable jQuery libraries
Retire.js
bootstrap 3.3.1 Found in -https://www.hotline40.com.au/wp-content/themes/motors/assets/js/bootstrap.min.js?ver=4.2.5
Vulnerability info:
High 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331 1
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041 1
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040 1
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042 1
jquery-migrate 1.2.1.min Found in -https://www.hotline40.com.au/wp-content/themes/motors/assets/js/jquery-migrate-1.2.1.min.js?ver=4.2.5
Vulnerability info:
Medium 11290 Selector interpreted as HTML 12
jquery 1.12.4 Found in -https://www.hotline40.com.au/wp-includes/js/jquery/jquery.js?ver=1.12.4
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251 1234
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers 123
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution