Re: https://www.eff.org/https-everywhere/atlas/domains/maam.ru.html
Retirable jQuery library detected, app.js → http://retire.insecurity.today/#!/scan/9c60645c7fb2e8984a6ed3bcd9cd96a3b127ce9f0e470e5b6323b71a97934e56
Just for that script with missing SRI-hash generated for it. See further down ** (‘same-origin’ rule violation).
See: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fconnect.ok.ru%2Fconnect.js+
and overflow to Results from scanning URL: hxtp://www.reklamamobilna.com.pl/96/scripts/ds_snippets.js
Number of sources found: 41
Number of sinks found: 17
No alerts here: http://urlquery.net/report.php?id=1498924946987
Suspicious redirects given: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=www.maam.ru&ref_sel=GSP2&ua_sel=ff&fs=1
Problematic in code line 371: Google has been flagging sites that collect user information (passwords) over HTTP.
Selectel abuse: http://toolbar.netcraft.com/site_report?url=www.maam.ru
-maam.ru
Warnings
SSLv3
Your server’s encryption settings are vulnerable. This server uses the SSLv3 protocol, which is not secure. More information.
This server is vulnerable to:
Poodle (SSLv3 protocol)
This server is vulnerable to a Poodle (SSLv3) attack.
Mediocre F-status: https://observatory.mozilla.org/analyze.html?host=www.maam.ru
** B-status: https://observatory.mozilla.org/analyze.html?host=www.maam.ru
See: https://urlscan.io/result/a50c765f-d883-441f-97f0-8fa678002ad2#summary
and particularly: https://urlscan.io/result/a50c765f-d883-441f-97f0-8fa678002ad2/dom/
link to a closed community: -https://vk.com/widget_community.php?app=0&width=270px&_ver=1&gid=11512225&mode=0&color1=FFFFFF&color2=2B587A&color3=5B7FA6&class_name=&height=230&url=http%3A%2F%2Fwww.maam.ru%2F&referrer=&title=%D0%92%D0%BE%D1%81%D0%BF%D0%B8%D1%82%D0%B0%D1%82%D0%B5%D0%BB%D1%8F%D0%BC%20%D0%B4%D0%B5%D1%82%D1%81%D0%BA%D0%B8%D1%85%20%D1%81%D0%B0%D0%B4%D0%BE%D0%B2%2C%20%D1%88%D0%BA%D0%BE%D0%BB%D1%8C%D0%BD%D1%8B%D0%BC%20%D1%83%D1%87%D0%B8%D1%82%D0%B5%D0%BB%D1%8F%D0%BC%20%D0%B8%20%D0%BF%D0%B5%D0%B4%D0%B0%D0%B3%D0%BE%D0%B3%D0%B0%D0%BC%3A%20%D0%BA%D0%BE%D0%BD%D1%81%D0%BF%D0%B5%D0%BA%D1%82%D1%8B%2C%20%D1%80%D0%B0%D0%B7%D1%80%D0%B0%D0%B1%D0%BE%D1%82%D0%BA%D0%B8…&15cff142964 which enables vkontakte proliferation -
This blocked for me by uMatrix: -http://www.liveinternet.ru/clic → https://webcookies.org/scan/6560644
polonus (volunteer website security analyst and website error-hunter)