Reputation Check
PASSED
Google Safe Browse:OK
Spamhaus Check:OK
Abuse CC:OK
Dshield Blocklist:OK
Cisco Talos Blacklist:OK
Web Server:
cloudflare
X-Powered-By:
PHP/7.3.11 Outdated Software Detected
7.5
CVE-2019-11049
In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations.
7.5
CVE-2019-11047
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
6.4
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
6.4
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
5
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
5
CVE-2019-19246
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
5
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
4.3
IP Address:
104.31.91.246
Hosting Provider:
Cloudflare.
Shared Hosting:
500 sites found on 104.31.91.246
Configuration OK - external links Google Safebrowsing approved.
Javascript errors related to script blocker action
ReferenceError: jQuery is not defined
/:1194
ReferenceError: jQuery is not defined
/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=2.8.5:2
TypeError: a.extend is not a function
/wp-content/plugins/elementor/assets/lib/dialog/dialog.min.js?ver=4.7.3:3
TypeError: Cannot read property 'each' of undefined
/wp-content/plugins/elementor/assets/lib/waypoints/waypoints.min.js?ver=4.0.2:1
ReferenceError: elementorModules is not defined
/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=2.8.5:2
Also consider:
https://webcookies.org/cookies/beautyloungelk.com/28957248?678928Privacy Impact Score = D -> The page loads 39 third-party JavaScript files and 37 CSS but does not employ Sub-Resource Integrity to prevent breach if a third-party CDN is compromised
Wait for a final verdict from an avast team member as they are the only ones to come and unblock.
As we here are just volunteers with relative knowledge in the field of website security and website error-hunting.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)