Vulnerablities with jQuery:
bootstrap 3.3.7 Found in -https://www.packages24.com/assets/js/bootstrap.min.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042
jquery 3.3.1.min Found in -https://www.packages24.com/assets/js/jquery-3.3.1.min.js _____Vulnerability info:
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Site is crawlable and indexable by bots, not cloaking, no spammy links.
Detection may be because of tracking by -mc.yandex.ru
N.B.
Important Note: 77.88.21.119 is an IP address from within our whitelist. Whitelisted netblocks are typically owned by trusted entities, such as Google or Microsoft who may use them for search engine spiders. However, these same entities sometimes also provide cloud servers and mail services which are easily abused. Pay special attention when trusting or distrusting these IPs.
So wait for a final verdict from avast team, as they are the only ones to decide to unblock and give the actual status to that detection.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)