jQuery Easing v1.3 vulnerable to hotlinking...

Detection missed at both Sucuri and Quttera’s: -https://www.virustotal.com/nl/url/d3caa1d6979f8f5c2e5a0b45bda2aba44b266d0193a42cd64a3240c42fed3ea9/analysis/1440489105/
Re: -http://XXXXXXX/www.pflegedienst-arteclean.de
PHISING reported: -https://cymon.io/85.25.132.44 → -http://www.domxssscanner.com/scan?url=http%3A%2F%2Fpflegedienst-arteclean.de%2Falt%2Fcnp%2Fcss%2Fde%2Fhttp%3A%2Ffdj-bingo-pp.nextedia.com%2Fajax%2Femogrif-apple.phphttp%3A%2Fuschplc.com.ru%2Fch-update%2Fdeu.html%3Flogin
Consider: -http://www.pflegedienst-arteclean.de/%20—%20http:/pflegedienst-arteclean.de/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/frameworks/jQuery/jquery-1.7.2.min.js → jQuery Versions Vulnerable to Selector XSS with class Attribute (‘. XSS_VECTOR’)

polonus