See: https://securityheaders.io/?q=http%3A%2F%2Fwww.webs.com%2F
and https://test.drownattack.com/?site=http%3A%2F%2Fwww.webs.com%2F
Cloaking and suspicious iFrames: http://isithacked.com/check/http%3A%2F%2Fwww.webs.com
Accordingly this site that was built with it was hacked and defaced: http://toolbar.netcraft.com/site_report?url=http://fisherpriceclassaction.com
/-http://www.webs.com
Detected libraries:
jquery - 2.1.0 : (active1) -http://ajax.googleapis.com/ajax/libs/jquery/2.1.0/jquery.min.js
jquery - 1.6.4 : http://cdn.optimizely.com/js/621373388.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
backbone.js - 0.9.2 : (active1) -http://www.webs.com
(active) - the library was also found to be active by running code
1 vulnerable library detected
polonus (volunteer website security analyst and website error-hunter)