All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.
On 2019-01-31T07:22:30.843401+00:00 we found suspicious pattern PossibleExecutable, type: Suspicious, (Attempt to load a Windows executable file from a web page that may me malware or potentially unwanted software or benign plug-in such as Adobe Flash) in the page https://s.h2.pdim.gs/muse/js/indexnext.… referenced from https://www.panda.tv/ .
The suspicious code sample:
b'.exe"' … b'.exe"' … b'<object classid='
This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).