Hi, vova[.]com was unblocked yesterday, 09:25 CEST.
Hi HonzaZ,
Thank you very much!
Hi dyang,
Anyone can do it, when you’re careful enough to make the right combinations and deductions.
My website scanning is performed through normal third party cold reconnaissance public website scanners online.
I never actually visit the website to be evaluated.
Recently I use sonarwahl or now known as webhint where I use: https://snyk.io/vuln/npm:jquery to verify
retirable jQuery libraries, another is Redleg's file viewer for the code checks and Google alerts.
Also checked retirable jQuery from Erlend Oftedal’s scanner - retire.insecurity.today/#
But I also make use of other scanners as seem appropriate.
The script errors that are found, come from a javascript unpacker service run on any particular uri or piece of javascript code.
Going beyond expected runtime is a give away of suspicion and so are scripting errors, I check them at Stack-Overflows.
This is helpful for developers where they missed something while dealing with the scriptcode (undefined this or undefined that etc.).
Another thing that counts is me doing this for 14 years here in the Virus and Worms now, to be short it is called “experience”.
Important is that webmasters, hosters, web-developers, etc. learn to code with security at heart,
update and patch en configure according to best practices.
To bring this nearer in practice is also part of my motivation and constant “preaching to the choir”.
Also I like avast av and like to give them a helping hand from time to time.
I owe them this platform as a place to post at least and all I learnt here with the help of colleagues.
polonus (3rd party cold reconnaissance website security analyst and website error-hunter)
I have the same problem, when I access the my site:
https://beautyloungelk.com/
:-[https://beautyloungelk.com/
Reputation Check
PASSED
Google Safe Browse:OK
Spamhaus Check:OK
Abuse CC:OK
Dshield Blocklist:OK
Cisco Talos Blacklist:OK
Web Server:
cloudflare
X-Powered-By:
PHP/7.3.11 Outdated Software Detected
7.5
CVE-2019-11049
In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations.
7.5
CVE-2019-11047
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
6.4
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
6.4
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
5
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren’t ASCII numbers. This can read to disclosure of the content of some memory locations.
5
CVE-2019-19246
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
5
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
4.3
IP Address:
104.31.91.246
Hosting Provider:
Cloudflare.
Shared Hosting:
500 sites found on 104.31.91.246
Configuration OK - external links Google Safebrowsing approved.
Javascript errors related to script blocker action
ReferenceError: jQuery is not defined /:1194ReferenceError: jQuery is not defined
/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=2.8.5:2TypeError: a.extend is not a function
/wp-content/plugins/elementor/assets/lib/dialog/dialog.min.js?ver=4.7.3:3TypeError: Cannot read property ‘each’ of undefined
/wp-content/plugins/elementor/assets/lib/waypoints/waypoints.min.js?ver=4.0.2:1ReferenceError: elementorModules is not defined
/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=2.8.5:2
Also consider: https://webcookies.org/cookies/beautyloungelk.com/28957248?678928
Privacy Impact Score = D → The page loads 39 third-party JavaScript files and 37 CSS but does not employ Sub-Resource Integrity to prevent breach if a third-party CDN is compromised
Wait for a final verdict from an avast team member as they are the only ones to come and unblock.
As we here are just volunteers with relative knowledge in the field of website security and website error-hunting.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Detection was removed in 11.02.2020
Our virus specialists have been working on this problem and it has now been resolved. The provided website isn't detected by Avast anymore.
Hello,
My site https://streamyard.com has been incorrectly flagged for phishing. The same thing has happened twice in the past and avast/avg removed the warning and said it was a false positive. Please help.
You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php
Probably flagged for a hidden iFrame, see code line 65 here:
https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=c3R9e3xteXx9Iy5eXW1g~enc
Web Firewall blocks -https://www.googletagmanager.com/ns.html?id=GTM-5KG4PZD as “Ads”.
Not being flagged at VT here: https://www.virustotal.com/gui/ip-address/35.227.212.162/relations
Wait for an avast team member to give a final verdict as they are the only ones to come and unblock.
polonus
Detection has already been removed.
Our virus specialists have been working on this problem and it has now been resolved. The provided website isn't detected by Avast anymore.
Hello Avast,
It seems my website has the same problem: https://www.eshop.lk but my files and site clean and safe according to virus total
So Could you please remove it from the blacklist?
Thank You.
Report a false positive (select file or website)
https://www.avast.com/false-positive-file-form.php
I am using Core Shields on " High sensitivity " and having no problems with this website.
Greetz, Red
Avast does not block this website at the moment.
Only alerts tracking by pinterest
links to gstactic dot com, fonts.googleapis dot com & tawk dot to
This site has 100% content.
That’s all we know,
polonus