Avast WEBforum
Other => General Topics => Topic started by: DEDIbl on November 25, 2019, 09:49:13 AM
-
i got my website on avast's black list, why ? and how can i get out of this list ?
when im trying to get inside the website thougrh google chrome on my personal computer ( i got avast ) its just blocking me .....
i got request to check my url on https://www.virustotal.com/ and this is the result :
https://www.virustotal.com/gui/url/8d4bad3e815ee1c73c08fc835293386f22cd30d40ba1455c4c3a5debab5f7011/detection
The result : "No engines detected this URL " .
Thanks for the helpers
-
-> https://forum.avast.com/index.php?topic=226365.msg1501079#msg1501079
-
Again i got inside this link you sent , checked with those sites my website and the results that im totally clean.... now what ?
see the results :
https://sitecheck.sucuri.net/results/https/www.top10antivirussoft.com
https://www.virustotal.com/gui/url/8d4bad3e815ee1c73c08fc835293386f22cd30d40ba1455c4c3a5debab5f7011/detection
thanks
-
We newly classify this type of sites (comparison where you pay to be on top) to be malicious as these sites mislead users in very wrong way.
-
We newly classify this type of sites (comparison where you pay to be on top) to be malicious as these sites mislead users in very wrong way.
My site is maybe comparison site but its truly not put anyone on top cause payment , i can prove you private that i get the same payment and commission from all the vendors and the ranking is honestly by experience and knowledge .
-
You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php
-
You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php
did it ! i will check now on my personal computer ( with avast ) is it works ..... hope it will :)
-
Hello,
if you think that the URL should not be blocked use https://www.avast.com/false-positive-file-form.php, please.
Milos
-
Wait for a final verdict from avast team, as they are the only ones to come and unblock.
In the mean time site is open to some improvement.
Retirable jQuery library detected: jquery 3.3.1 Found in -https://www.universal-robots.com/js/universal-robots.js?v=1.8.7
Vulnerability info:
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
See recommendations found through linting (especially under security):
https://webhint.io/scanner/9f2cb491-82fd-4756-a99d-e21263c528a8
Also developmet console error:
content.js:19
Loaded script with known vulnerabilities: https://www.universal-robots.com/js/universal-robots.js?v=1.8.7
- jquery 3.3.1 - Info: https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/ https://nvd.nist.gov/vuln/detail/CVE-2019-11358 https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b
- jquery-ui-dialog 1.12.1 - Info:
- jquery-ui-autocomplete 1.12.1 - Info:
- jquery-ui-tooltip 1.12.1 - Info:
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)