Quttera gives it as clean:
https://quttera.com/detailed_report/www.docservices.orgNo flags here:
https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=www.docservices.org&ref_sel=GSP2&ua_sel=ff&fs=1F-Grade and recommendations:
https://observatory.mozilla.org/analyze.html?host=www.docservices.orgB-Grade:
https://sritest.io/#report/c6090c62-1929-4552-8a84-1c0539f7a4fb1 vuln. library:
http://retire.insecurity.today/#!/scan/936a2f14308b64ef6a1c8cd74a23a73d405cd7f62036f8bd8fd862697c25f3e7CMS conf. errors: Warning User Enumeration is possible
The first two user ID's were tested to determine if user enumeration is possible.
ID User Login
1 docservi docservi
2 None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation
Warning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.
host.itsaboutimage.website abuse, flagged:
http://urlquery.net/report/4c5caf5a-1604-4f5c-a0d2-c1e0bed220132 flag:
https://www.virustotal.com/pl/url/623228d4b9cec2089d42a6dbb56bb9a1b1d5a6c1e17b26bede0bdc8bd4d07671/analysis/1500550061/Also vuln. here:
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fplatform-api.sharethis.com%2Fjs%2Fsharethis.jserror:
found JavaScript
error: line:7: SyntaxError: missing : after property id:
error: line:7: Element('div');d.className = 'fontDetect';var baseFontName, checkFontName, baseElement, checkElement;for(var baseFontIndex=0;baseFontIndex<stlib1.stfp.baseFontsLength;baseFontIndex++){baseFontName = stlib1.stfp.baseFonts[baseFontIndex];baseElement = do
error: line:7: .........^
error: undefined variable stlib.util.prop("hash", document.location)
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var stlib.util.prop("hash", document.location) = 1;
error: line:1: ....^
Missed close "paren", passed but with "/*** called setTimeout with function () {return s.init({}); }, 10 */ ",
this latter because of the point where it is valuated, namely at parse/compiletime.
polonus (volunteer website security analyst and website error-hunter)