Netcraft has Site Blocked: Suspected Phishing
This page has been blocked by the Netcraft Extension.
Blocked URL: hxxps://attyahoonettt.weebly.com/
See:
https://www.phishtank.com/phish_detail.php?phish_id=6695724&frame=detailsConsider results from scanning URL: -https://attyahoonettt.weebly.com/files/templateArtifacts.js?1595593588
Number of sources found: 43
Number of sinks found: 20 (search.results.hack)
Flagged:
https://www.virustotal.com/gui/url/547b1a1ada2683054ba9d0a33cad2ad46a46f36e41ccf09ede33424cf9f43a42/detectionSee:
https://www.shodan.io/host/199.34.228.54On the mainblog we stumble upon:
Retire.js
jquery 1.7.2 Found in -https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js<br>Vulnerability info:
Medium CVE-2012-6708 11290 Selector interpreted as HTML
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
Medium Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
JS errors:
ReferenceError: $ is not defined
/files/theme/parallax.js:12
TypeError: Cannot read property 'setupContainer' of undefined
/:165 HTMLDocument.()
:3:98()
HTMLDocument.G.c. (eval at exec_fn (:1:147), :42:472)()
:3:98()
c (:2:146)()
:3:98()
G (eval at exec_fn (:1:147), :42:498)()
HTMLDocument.H (eval at exec_fn (:1:147), :49:154)()
SyntaxError: Invalid regular expression flags
eval ()()
:3:98()
Object.c [as F_c] (:2:146)()
Object.E_u (:3:267)()
la (eval at exec_fn (:1:147), :60:53)()
Object.create (eval at exec_fn (:1:147), :71:325)()
d (eval at exec_fn (:1:147), :13:89)()
JavaScript frameworks
Mustache
2.1.3
React
pol