PHP version on website is vulnerable. See the various vulnerabilities for the PHP version that is used:
http://4.59.136.200/plugins/index.php?view=single&id=77285This had been defaced with malicious PHP content: wp-content/plugins/revslider/rs-plugin/css/captions.css?ver=4.3.1
- it is possible for an attacker to read your wp-config.php and find your database credentials, which may allow them to compromise your site’s database. We don’t allow random IP addresses to connect directly to your database, but that may not prevent someone from finding a way to use database info to connect to your DB.
Seems now cleansed: -http://quednaudesign.com.br/wp-content/plugins/revslider/rs-plugin/js/jquery.themepunch.revolution.min.js?ver=4.3.1
200 OK
Content-Length: 83792
Content-Type: application/javascript
clean
WP Plug-in vulnerabilities can be checked with this:
https://wordpress.org/plugins/plugin-vulnerabilities/Rendering issues:
Render blocking resources
The elements below are blocking the “above the fold” rendering.
The javascript files below are blocking the rendering.
-http://quednaudesign.com.br/.. /jquery.js?ver=1.11.3
-http://quednaudesign.com.br/.. /jquery-migrate.min.js?ver=1.2.1
-http://quednaudesign.com.br/.. /jquery.themepunch.revolution.min.js?ver=...
-http://quednaudesign.com.br/.. /jquery.form.min.js?ver=3.51.0-2014.06.20...
-http://quednaudesign.com.br/.. /scripts.js?ver=4.3
-http://quednaudesign.com.br/.. /add-to-cart.min.js?ver=2.4.7
-http://quednaudesign.com.br/.. /select2.min.js?ver=3.5.2
-http://quednaudesign.com.br/.. /jquery.blockUI.min.js?ver=2.70
-http://quednaudesign.com.br/.. /woocommerce.min.js?ver=2.4.7
-http://quednaudesign.com.br/.. /jquery.cookie.min.js?ver=1.4.1
-http://quednaudesign.com.br/.. /cart-fragments.min.js?ver=2.4.7
-http://quednaudesign.com.br/.. /common.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /modernizr-2.6.2-respond-1.1.0.min.js?ver...
-http://quednaudesign.com.br/.. /noconflict.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /webfont.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.prettyPhoto.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /extensions.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /woocommerce.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /comment-reply.min.js?ver=4.3.1
-http://quednaudesign.com.br/.. /queryloader2.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /waypoints.min.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /waypoints-sticky.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.smoothscroll.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.flexslider.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.viewport.mini.js?ver=2.0.9.2
-http://quednaudesign.com.br/.. /jquery.validationEngine-pt.js?ver=2.6.19...
-http://quednaudesign.com.br/.. /jquery.validationEngine.js?ver=2.6.19
-http://quednaudesign.com.br/.. /front-subscribers.js?ver=2.6.19
-http://use.typekit.net/pgb4snz.js
-http://www.google-analytics.com/ga.js
You can save 25.1KB (6% compression) on the analysed URL by minifying the javascript files, CSS, etc.
The browser cache have not set correctly for all elements.
polonus (volunteer website security analyst and website error-hunter)