Quelques observations des choses:
1.
DS alert for ETPRO WEB_CLIENT Microsoft Internet Explorer remote code execution via option element
2.
Les choses d' IP:
http://support.clean-mx.de/clean-mx/viruses.php?ip=216.239.32.21&sort=id%20desc3.
[6-October-2013 16:42:21] PHP Fatal error: Call to undefined function de_obfuscate() in /public_html/php-functions/base-64.php on line 351
4.
could be a block for ocsp.comodoca.com which is in some blacklists Comodo's and McAfee's (POST) signature cert found unvalid
5.
Pourquoi c'est indiqué par avast!? -> Re:
https://asafaweb.com/Scan?Url=www.rapnostress.comL'insécurité c''est:
-> -> Websites are at risk of a clickjacking attack when they allow content to be embedded within a frame. An attacker may use this risk to invisibly load the target website into their own site and trick users into clicking on links which they never intended to. An "X-Frame-Options" header should be sent by the server to either deny framing of content, only allow it from the same origin or allow it from a trusted URIs.
Result
It doesn't look like an X-Frame-Options header was returned from the server which means that this website could be at risk of a clickjacking attack. Add a header to explicitly describe the acceptable framing practices (if any) for this site. (also flagged as insecurity at Quttera's report)
6. Quttera's potential suspicious code should be read as insecure code practices being performed in the webcode, that could lead to real attacks and likewise threats - detectable malware.
7. Seems from the latest urlquery report the site has now been cleansed and does noy longer get the IDS alert as given sub 1.
8. Pour les rapports des faux positifs:
www.avast.com/contact-form.php
9. If the virus is live it is a facebook virus -
Host: static dot ak dot facebook dot com
polonus