I am using Avastfreeantivirus, it is giving URL: Phishing message for my website. Which I believe is not correct as all scans to my website are correct. URL to my site is: shorturl.at/otBT6.
Can you please check it with threalab and let us know what causing this message.
503 Service Unavailable
Your web server is overloaded, down for maintenance, or down because of malware. Please check that you can access your web server in a web browser. Try to scan the website again by clicking Force a Re-scan link at the bottom of the SiteCheck results page.
jquery-ui-dialog 1.10.4 Found in -https://ubldigital.com/Portals/_default/skins/ubldigital/NewHome/js/jquery-ui-v4.js _____Vulnerability info:
Medium CVE-2016-7103 281 XSS Vulnerability on closeText option
jquery 03_02_01 Found in
-https://ubldigital.com/Resources/libraries/jQuery/03_02_01/jquery.js?cdv=21 _____Vulnerability info:
Medium CVE-2011-4969 XSS with location.hash
Medium CVE-2012-6708 11290 Selector interpreted as HTML
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS 1
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS 1
jquery 1.9.1 Found in -https://ubldigital.com/ScriptResource.axd?d=mbGZm65DzNBNaMI79R6DOtZs2-WF0s1ZTaPhd1XxlGeKoXX13DXNo95DScDOIAOfRwLz9mH52Da7BriM_Y6K1w-LHgoosGmZqoL7eQvS5Csspgya0&t=ffffffff9e0cf75b _____Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251 1234
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers 123
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution 123
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS 1
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS