I've just ran w3af on your URL.
[Sun 11 Aug 2013 09:39:51 BST] Auto-enabling plugin: discovery.serverHeader
[Sun 11 Aug 2013 09:39:51 BST] Auto-enabling plugin: discovery.allowedMethods
[Sun 11 Aug 2013 09:39:51 BST] Auto-enabling plugin: discovery.frontpage_version
[Sun 11 Aug 2013 09:40:00 BST] The page language is: en
[Sun 11 Aug 2013 09:40:00 BST] The uri parameter of xUrllib.POST() must be of urlParser.url_object type.
[Sun 11 Aug 2013 09:40:00 BST] The uri parameter of xUrllib.POST() must be of urlParser.url_object type.
[Sun 11 Aug 2013 09:40:02 BST] The remote HTTP Server omitted the "server" header in its response. This information was found in the request with id 34.
[Sun 11 Aug 2013 09:40:03 BST] "X-Powered-By" header for this HTTP server is: "Express". This information was found in the request with id 35.
[Sun 11 Aug 2013 09:40:03 BST] Found 1 URLs and 1 different points of injection.
[Sun 11 Aug 2013 09:40:03 BST] The list of URLs is:
[Sun 11 Aug 2013 09:40:03 BST] -
http://www.bitstrat.com[Sun 11 Aug 2013 09:40:03 BST] The list of fuzzable requests is:
[Sun 11 Aug 2013 09:40:03 BST] -
http://www.bitstrat.com | Method: GET
[Sun 11 Aug 2013 09:40:03 BST] The web application sent a persistent cookie.
[Sun 11 Aug 2013 09:40:05 BST] The URL: "http://www.bitstrat.com" discloses the credit card number: "***********7656"". This vulnerability was found in the request with id 1.
[Sun 11 Aug 2013 09:40:05 BST] The URL: "http://www.bitstrat.com/" discloses the credit card number: "***********7656"". This vulnerability was found in the request with id 31.[Sun 11 Aug 2013 09:40:05 BST] The remote HTTP Server omitted the "server" header in its response. This information was found in the request with id 34.
[Sun 11 Aug 2013 09:40:12 BST] Password profiling TOP 100:
[Sun 11 Aug 2013 09:40:12 BST] - [1] BitStrat with 147 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [2] Game with 42 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [3] document with 42 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [4] function with 42 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [5] facebook with 42 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [6] BITSTRAT with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [7] Service with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [8] Bitcoin with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [9] Strategy with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [10] toggle with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [11] connect with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [12] createElement with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [13] collapse with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [14] onload with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [15] Terms with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [16] jssdk with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [17] script with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [18] currently with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [19] getElementById with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [20] xfbml with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [21] test with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [22] gamble with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [23] return with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [24] insertBefore with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [25] getElementsByTagName with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [26] Collective with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [27] Register with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [28] beta with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [29] Contact with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [30] appId with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [31] phase with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [32] using with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [33] navbar with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [34] bitcoins with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [35] parentNode with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [36] testnet with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [37] Rooms with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] - [38] Compete with 21 repetitions.
[Sun 11 Aug 2013 09:40:12 BST] The whole target has no protection (X-Frame-Options header) against ClickJacking attack[Sun 11 Aug 2013 09:40:12 BST] The cookie: "connect.sid=s%3Amb-3-WU9cVSUZVROGdw2TXbR.VGE8WR4XstVwdYu7Y04ws8GRQXIr4XnLtRiTGhaKghffuI3GGmUz4lkwLG3v6KvKUEPoH%2FeKQ2HgMp%2BeRYdS2A; Path=/; Expires=Mon, 12 Aug 2013 08:39:52 GMT" was sent by these URLs:
[Sun 11 Aug 2013 09:40:12 BST] -
http://www.bitstrat.com[Sun 11 Aug 2013 09:40:12 BST] The URL: "http://www.bitstrat.com" discloses the credit card number: "***********7656". This vulnerability was found in the request with id 1.
[Sun 11 Aug 2013 09:40:12 BST] The URL: "http://www.bitstrat.com/" discloses the credit card number: "***********7656". This vulnerability was found in the request with id 31.
[Sun 11 Aug 2013 09:40:12 BST] Scan finished in 20 seconds.
Hopefully this helps somewhat.
Matthew:out