Address is could be redirecting to banner malcode?
Issues with telos dot de.
OpenSSH 5.5p1 Debian 6+squeeze7 (protocol 2.0) PHP/5.3.3-7+squeeze1
PHP vulnerable to arbitrary PHP code execution.
Site risk status 1 red out of 10:
http://toolbar.netcraft.com/site_report?url=http://satellit.telos.deFor wxw.telos.de -> Overview
Cookies not flagged as "HttpOnly" may be read by client side script and are at risk of being interpreted by a cross site scripting (XSS) attack. Whilst there are times where a cookie set by the server may be legitimately read by client script, most times the "HttpOnly" flag is missing it is due to oversight rather than by design.
Result
It looks like 2 cookies are being set without the "HttpOnly" flag being set (name : value):
PHPSESSID : mk16r3l8l278mpqh8oc7uhjul0
nf_wp_session : 69eb2731a4e2578d600b0d0f57a9bb46%7C%7C1444863977%7C%7C1444863917
This is what is flagged: Requested URL: -http://www.telos.de/ | Response URL: -http://www.telos.de/ | Page title: telos Systementwicklung GmbH | telos | HTTP status code: 200 (OK) | Response size: 31,367 bytes (gzip'd) | Duration: 1,625 ms Clickjacking...
polonus