See: https://www.virustotal.com/en/url/cd1078180e661f96a277b2cf64c455637969d54234848b6a24f765a704ed280a/analysis/1455730295/
Quttera flags: /.s/src/criteo_adblock.js
Severity: Potentially Suspicious
Reason: Suspicious JavaScript code injection.
Details: Procedure: + has been called with a string containing hidden JavaScript code document.MAX_ct0 = 'INSERT_CLICK_URL';var m3_u = (location.protocol == 'https:' ? 'https://cas.criteo.com/delivery/ajs.php?\’ : 'http://cas.criteo.com/delivery/ajs.php?\');var m3_r = Math.floor(Math.random() * 99999999999);document.write(“<scr” + “ipt type='text/javascript' src='” + m3_u);document.write (“zoneid=357371”);document.write('%26amp;cb=' + m3_r);if (document.MAX_used != ',') document.write(“%26amp;exclude=” + document.MAX_used);document.write(document.charset ? '%26amp;charset=' + document.charset : (document.characterSet ? '%26amp;charset=' + document.characterSet : ''));document.write(“%26amp;loc=” + escape(window.location).substring(0, 1600));if (document.context) document.write(“%26context=” + escape(document.context));if ((typeof(document.MAX_ct0) != 'undefined') %26%26 (document.MAX_ct0.substring(0, 4) == 'http')) { document.write(“%26amp;ct0=” + escape(document.MAX_ct0));}if (document.mmm_fo) docume
-http://spischi.moy.su
Detected libraries:
jquery - 1.7.2 : (active1) -http://s73.ucoz.net/src/jquery-1.7.2.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
1 vulnerable library detected
Re: https://sritest.io/#report/9b63a6e7-3570-4447-89f7-c75874b13e81 (4 unsafe scripts and 1 unsafe stylesheet)
Various excternal links blocked by adware and script blockers,
also consider: https://www.mywot.com/en/scorecard/s73.ucoz.net?utm_source=addon&utm_content=warn-viewsc
iFrames detected:
polonus (volunteer website security analyst and website error-hunter)