Extensibe server header info proliferation insecurity: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/1.0.0-fips DAV/2 mod_qos/11.6 mod_bwlimited/1.4
Quttera here blacklists 81 external links and 2 domains/hosts.
Vulnerable - Results from scanning URL: htxp://ambins.com/wp-content/plugins/mailchimp/js/mailchimp.js?ver=1.4.2
Number of sources found: 43
Number of sinks found: 19
and
Results from scanning URL: htxp://ambins.com/wp-includes/js/jquery/ui/jquery.ui.core.min.js?ver=1.10.4
Number of sources found: 18
Number of sinks found: 9
and
Results from scanning URL: htxp://ambins.com/wp-content/themes/bradley/lib/js/css_browser_selector.js?ver=0.4.0
Number of sources found: 17
Number of sinks found: 11
and
Results from scanning URL: htxp://s.gravatar.com/js/gprofiles.js?ver=2014Novaa
Number of sources found: 14
Number of sinks found: 17
* Vulnerable caused by improper validation of user-supplied input by display names in gravater templates. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
and
Results from scanning URL: htxp://stats.wp.com/e-201448.js
Number of sources found: 9
Number of sinks found: 3
pol