Content returned gives a.o. → Become: Unable to locate page…
For the third link you provided for us:
These suspicious escaped characters found up in the code (, %2C, %2C, %2C, %2F, %2C, %2F, %2C, %…) decodes to something like → ,/,/,/,/,/,///,/,/,/,/,/,/,//,//,
just on a side-line: %2F will be decoded in PATH_INFO is Apache HTTPD Bug…
Translates to htxp://cache-shop.pronto.com/combine.php?type=javascript&hash=980303887&files=lists.js%2Clibrary.js%2Cjquery-1-2-6.js%2Cplugins%2Fjquery-autocomplete.js%2Cplugins%2Fjquery-cookie.js%2Cplugins%2Fjquery-dimensions.js%2Cplugins%2Fjquery-history.js%2Cplugins%2Fjquery-form-plugin.js%2Cpronto3%2Fcommon%2Fplugins%2Frc-text-truncate.js%2Cautocomplete_init.js%2Ccommunity%2Fstar_rating.js%2Ccommunity%2Fcaptcha.js%2Ccommunity%2Fcontest.js%2Ccommunity%2Fcomment.js%2Ccommunity%2Flight_box.js%2Ccommunity%2Flight_box_element_utils.js%2Cpronto3%2Fcommon%2Fga.js%2Cpronto3%2Fcommon%2FdropDown.js%2CFixedDimensionsPopup.js%2CgridView.js%2CptmPopup.js flagged as XSS attack - but here it is supported compression code
Also see this code hick-up:
cache-shop.pronto dot com/js/main/pronto3/NC/jquery-cookie-ga-lightbox.ProntoV3_8_7_0.2012-08-23_08-20.js
[nothing detected] (script) cache-shop.pront dot .com/js/main/pronto3/NC/jquery-cookie-ga-lightbox.ProntoV3_8_7_0.2012-08-23_08-20.js
status: (referer=shop.pronto dot com/)saved 163721 bytes aa2d56a6b59a16bda5a19a9b46ba6be22df5d687
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined function a.getElementsByTagName
suspicious: