With web security test I get the following results.
Flagged are: Server/Redirect Status: Code: 301, htxp://www.detroitmedia.com/ Redirect to external server!
Javascript Check: Suspicious anguage=“javascript”>function dnnviewstate(){var a=0,m,v,t,z,x=new array(“9091968376”,“8887918192818786347374918784939277359287883421333333338896”,“778787”,"9499 *
Spam check: Suspicion of Spam
ef=“http://safe-md-store.com”>canadian SPAM
You are a responsible bloke, Pondus, and thanks for the detection update
I already have mailed a report with this thread and sent it to their mail address, to be added to detection.
AVG has this malcode covered
JS/HiddenLink is a new family we’ve created for injections such as these.
In the past, similar scripts were identified as JS/Redir.
and
The purpose of this script is to hide the link which follows after dnnViewSate function.
Please note that the function name varies.
So avast! should protect us also against this malscript injection.
Unless the script may not be running, because of a bug, it is dangerous enough to leave it undetected!