Insecurity on redirect website!

Where did we find the redirection: https://urlquery.net/report/dcf0b0e7-7861-49a2-8422-fe77e9b3d014

Where we engaged it? https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=nl.inncdn.com&ref_sel=GSP2&ua_sel=ff&fs=1

Where we have checked it was not a scam: https://www.scamadviser.com/check-website/crazyshare.cc

Security

x-content-type-options: 42 errors
validate-set-cookie-header: 1 error
strict-transport-security: 57 errors
disown-opener: 2 errors
no-disallowed-headers: 1 error
sri: 42 errors
no-vulnerable-javascript-libraries: 2 errors

For the latter: no-vulnerable-javascript-libraries: 2 errors

ERROR 1
jQuery@1.11.0 has 1 known vulnerabilities (1 medium). See https://snyk.io/vuln/npm:jquery for more information.
hxtps://crazyshare.cc/ error in javascript:

-crazyshare.cc/themes/flow/js/jquery-1.11.0.min.js
status: saved 96381 bytes b66ed708717bf0b4a005a4d0113af8843ef3b8ff
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined variable l
file: b66ed708717bf0b4a005a4d0113af8843ef3b8ff: 96381 bytes

Option like $l does not exist, do not give in such string (info credits forumweb dot pl’s Roberto).

ERROR 2
jQuery UI@1.10.3 has 1 known vulnerabilities (1 high). See https://snyk.io/vuln/npm:jquery-ui for more information.

With snyk we find two, here we will detect three:
https://retire.insecurity.today/#!/scan/87e03a8d66b74fde30b580afe039d1c0356bb910ea4bef99dedffae199a7d297

polonus (volunteer website security analyst and website error-hunter)