When scanning the site at VT Comodo flags it under the classification "illegal software".
Dr. Web's scan gives it the all green.
Errors on page:
ReferenceError: userip is not defined
/:125
NetworkError: Failed to execute 'send' on 'XMLHttpRequest': Failed to load '-https://sovetnik-off.ru/block/f7a40a70f084ad4eff9927b13155e997'.
XMLHttpRequest.patched [as send] (:1155:35)()
/:213
/:214
ReferenceError: _f7a40a70f084ad4eff9927b13155e997 is not defined
/:2349
SyntaxError: Unexpected identifier
eval ()()
:4:80()
Object.t [as F_c] (:3:191)()
Object.E_u (:4:244)()
eval (eval at exec_fn (:2:115), :67:477)()
Object.create (eval at exec_fn (:2:115), :69:193)()
c (eval at exec_fn (:2:115), :7:231)()
:4:80()
i (eval at exec_fn (:2:115), :5:165)()
eval (eval at exec_fn (:2:115), :5:292)()
SyntaxError: Invalid regular expression flags
eval ()()
:4:80()
Object.t [as F_c] (:3:191)()
Object.E_u (:4:244)()
eval (eval at exec_fn (:2:115), :67:477)()
Object.create (eval at exec_fn (:2:115), :69:193)()
c (eval at exec_fn (:2:115), :7:231)()
:4:80()
i (eval at exec_fn (:2:115), :5:165)()
eval (eval at exec_fn (:2:115), :5:292)()
Retirable libraries
Retire.js
bootstrap 3.3.5 Found in -https://stomshop.pro/catalog/view/javascript/bootstrap/js/bootstrap.min.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042
jquery 2.1.1.min Found in -https://stomshop.pro/catalog/view/javascript/jquery/jquery-2.1.1.min.js _____Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers 123
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution 123
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
But not given as vulnerable by Vulners. Site has 33 % tracking a.o. -www12.io, connect.facebook dot net and -mc.yandex.ru
and -https://tracker.convead.io/widgets/1627689600/widget-4dbd11e8d8030e1e18006e3d806830a2.js being blocked for me.
Wait for a final verdict by avast team, as they are the only ones to come and unblock,
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)