See: https://asafaweb.com/Scan?Url=payawebshomal.com
See: http://killmalware.com/payawebshomal.com/#
No detections here: https://www.virustotal.com/en/url/16de1695167d2708288ab9e49d87fd74a583ad3eda4eb58e8f7a7f93b3249e32/analysis/#additional-info
See: index
Severity: Suspicious
Reason: Detected suspicious redirection to external web resources at HTTP level. -
Details: Detected HTTP redirection to -http://www.serverjump.com/jump.aspx?jumpid=0sichm.
Sucuri flags: Suspicious conditional redirect. Details: http://sucuri.net/malware/entry/MW:HTA:7
Redirects users to:-http://www.serverjump.com/jump.aspx?jumpid=0sichm
Detected on redirect: -http://www.serverjump.com/jump.aspx?jumpid=0sichm
Detected libraries:
jquery - 1.3.2 : -http://www.jerseyspring.ru/includes/templates/jscript/jscript_jquery-1.3.2.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
1 vulnerable library detected
polonus