Hi JuanJo29,
You are more than welcome,
Skimming over part of that particular script of the source code in the main page I meet the following script errors with an unpacker:
[script] -pagead2.googlesyndication dot com/pagead/js/adsbygoogle.js
info: [decodingLevel=0] found JavaScript
error: line:18: SyntaxError: missing ) after argument list:
error: line:18:
error: line:18: ^
error: line:3: SyntaxError: missing = in XML attribute:
error: line:3: <script async src="-/pagead2.googlesyndication dot com/pagead/js/adsbygoogle.js"></script> <ins class="adsbygoogle" style="display:inline-block;width:300px;height:600px" data-ad-client="ca-pub-5072451624715859" data-ad-slot="1344587844"></ins> <script>(adsby
error: line:3: ..............^
file: e3d539db5c0e7cf90599f71db9753d16b6b3c5da: 7257 bytes
Various undefined like - undefined function e undefind variable n in wp includes code, similar where the SRI hash has not been generated for. Could be after you have modified.You will need to save the data in line 3 (highlighted). I see you have updated the vulnerable jQuery already.
I wish everybody would be so apt to react like you did, we would have a much more secure infrastructure by now.
Well done and stay safe and secure both offline as well as online. Nice to have met you here.
polonus (volunteer website security analyst and website error-hunter)