Bitdefender’s TrafficLight only one to detect this? See: https://www.virustotal.com/nl/url/ad16f4fcefcca1292d247d52dc0c6902963661f427a7989d6f8196fb395529f4/analysis/1415048933/
Sucuri’s does not flag a thing: http://sitecheck.sucuri.net/results/nugar.com
But Quttera’s detects: "Detected potentially suspicious content."Failure: nonnumeric port:
Re: http://jsunpack.jeek.org/?report=64d3f4099a12b4ffbf09e4f3e111094189da0e23
See: https://urlquery.net/report.php?id=1415049285767
Greensock script not behaving as expected. Vulnerable code for XSS:
Results from scanning URL: htxp://www.dabber.com/u2b/js/myjavascript.js
Number of sources found: 4
Number of sinks found: 13 Source: .innerHTML=restul.getElementsByTagName
Linktracker code
st_go({v:'ext',j:'1:3.2',blog:'38428508',post:'95',tz:'-5'});
var load_cmc = function(){linktracker_init(38428508,95,2);};
if ( typeof addLoadEvent != 'undefined' ) addLoadEvent(load_cmc);
else load_cmc();
This in the footer and loading from WP-stats, at least this should be set to “Set link private”,
so that rogue link was being un-privated so to speak. So this was through cracking the admin account through the header.php file.
So solution remove that long code from witin the header.php file.
polonus