Author Topic: Website kicks up weird errors...  (Read 845 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Website kicks up weird errors...
« on: July 28, 2020, 10:31:51 PM »
Like
Quote
Warning: include_once(/home/scambust/public_html/wp-content/plugins/wp-super-cache/wp-cache-phase1.php): failed to open stream: No such file or directory in /home/scambust/public_html/wp-content/advanced-cache.php on line 21

Warning: include_once(): Failed opening '/home/scambust/public_html/wp-content/plugins/wp-super-cache/wp-cache-phase1.php' for inclusion (include_path='.:/usr/local/php73/pear') in /home/scambust/public_html/wp-content/advanced-cache.php on line 21

Warning: Cannot modify header information - headers already sent by (output started at /home/scambust/public_html/wp-content/advanced-cache.php:21) in /home/scambust/public_html/wp-includes/pluggable.php on line 1281

Consider: https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=d3d3LnNefG1idXN0e31zLl19Z2A%3D~enc

Javascript errors:
Quote
TypeError: window.ezorqs is not a function
 /:222 addListeners()
 /:225 __ez_addAllListeners()
 /:2 func.process()
 /:17 processItems()
 /:16 processAll()
 /:3 HTMLScriptElement.scr.onerror()

SyntaxError: Invalid regular expression flags
  eval ()()
  :3:98()
  Object.c [as F_c] (:2:146)()
  Object.E_u (:3:267)()
  la (eval at exec_fn (:1:147), :60:53)()
  Object.create (eval at exec_fn (:1:147), :71:325)()
  d (eval at exec_fn (:1:147), :13:89)()


Various Tracking Scripts are being blocked.
Quote
VM251:37 Syntax error @ "Alert DOM-XSS Userscript"!
##########################
JSHINT output:
##########################

SyntaxError: Invalid regular expression flags
    at eval (<anonymous>)
    at <anonymous>:3:98
    at Object.c [as F_c] (<anonymous>:2:146)
    at Object.E_u (<anonymous>:3:267)
    at la (eval at exec_fn (:1:147), <anonymous>:60:53)
    at Object.create (eval at exec_fn (:1:147), <anonymous>:71:325)
    at d (eval at exec_fn (:1:147), <anonymous>:13:89)
Script errors detected: https://sitecheck.sucuri.net/results/https/www.scambusters.org (pluggable php)

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!