Exploitable to Null Byte Injection, read : http://blog.benjaminwalters.net/?p=22139
No alerts here: http://urlquery.net/report.php?id=1422806351736
Quttera-blacklisted: List of blacklisted external links: 51List of referenced blacklisted domains/hosts: 2
-projetweb.net
wXw.projetweb.net
Sucuri misses it alltogether: http://sitecheck.sucuri.net/results/projetweb.net#sitecheck-details
Flagged here:
https://www.virustotal.com/nl/ip-address/37.59.46.141/information/ flagged by BitdefenderTrafficLight
148 websites on one and same IP: http://sameid.net/ip/37.59.46.141/
Site has browser.contentHandlers.types.1.uri;
Value =htxp://add.my.yahoo.com/rss?url=%s
www.projetweb.net/wp-content/themes/Vertex/js/custom.js benign
[nothing detected] (script) wXw.projetweb.net/wp-content/themes/Vertex/js/custom.js * Vertex vulnerability?
status: (referer=wXw.projetweb.net/classifieds/)saved 14242 bytes 7365e8adcb21ec676f8a757fc4bc9469525e3877
info: [decodingLevel=0] found JavaScript
error: undefined variable jQuery
error: undefined variable $.fn
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var $.fn = 1;
error: line:1: …^
suspicious: * actually could be “false positives” using legitimate eval codes…
Results from DOM XSS scanning URL: http://www.projetweb.net/wp-content/themes/Vertex/js/waypoints.min.js
Number of sources found: 43
Number of sinks found: 19
polonus