See where it is being missed: http://killmalware.com/www.centralfloridaagnews.com/
Issues for domain: https://mxtoolbox.com/domain/www.centralfloridaagnews.com/
Given as suspicious: https://www.virustotal.com/en/url/9699256a45410ead968dd850f0a8f4216fd051391c53a4ecbdbbbedd8eca2917/analysis/1455127001/
Code that should be retired: -http://www.centralfloridaagnews.com
Detected libraries:
jquery - 1.11.3 : (active1) -http://www.centralfloridaagnews.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
jquery-migrate - 1.2.1 : -http://www.centralfloridaagnews.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jPlayer - 2.1.0 : (active1) -http://www.centralfloridaagnews.com/wp-content/themes/immersion/js/jquery.jplayer.min.js?ver=4.4.2
Info: Severity: high
http://jplayer.org/latest/release-notes/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2023
Info: Severity: high
http://jplayer.org/latest/release-notes/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1942
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2022
Info: Severity: high
http://jplayer.org/latest/release-notes/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected
No WordPress isssues detected.
2 Issues for Stylesheets flagged here: https://sritest.io/#report/03932cc0-e227-4206-92cb-c65e07daaffc
Tag Result
Quttera detects 13 potentially suspicious files: Severity: Potentially Suspicious
Reason: Detected potentially suspicious content.
Details: Detected potentially suspicious initialization of function pointer to JavaScript method String.fromCharCode __tmpvar1517043230 = String.fromCharCode;
see attached image
Vulnerable code and see where it lands: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.centralfloridaagnews.com%2Fwp-content%2Fthemes%2Fimmersion%2Fjs%2Fjquery.jplayer.min.js%3Fver%3D4.4.2
polonus