See scan results OK: http://isithacked.com/check/http%3A%2F%2Fwww.moyka-okon.ru
See this drupal code: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fmoyka-okon.ru%2Fmisc%2Fdrupal.js%3Fo9fm6m
Wit jQuery.no conflict override jQuery.fn.init to guard against XSS attacks - 2014 Avast detected JS: Includer-AWD [Trj] in that Drupal code, see how it works out on bootstrap.min.js.
-http://www.moyka-okon.ru
Detected libraries:
jquery - 1.4.4 : (active1) -http://www.moyka-okon.ru/misc/jquery.js?v=1.4.4
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.4.4 : (active1) -http://www.moyka-okon.ru/misc/jquery.js?v=1.4.4
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected
Scanner output: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.moyka-okon.ru%2Fmisc%2Fjquery.js%3Fv%3D1.4.4
ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP - could there be a trojan active?
websites on IP hacked and defaced before: www.zone-h.org/mirror/id/26409123 www.zone-h.org/mirror/id/26409124
Here we find 6 issues: https://mxtoolbox.com/domain/moyka-okon.ru/
Unsafe SRI hashes: https://sritest.io/#report/4afffc4f-219d-4a1c-8c89-7a5ffc15b52e
Missing security headers and best practices:
https://securityheaders.io/?q=http%3A%2F%2Fmoyka-okon.ru%2F&followRedirects=on
polonus (volunteer website security analyst and website error-hunter)
polonus