jQuery libraries to be retired at Californian hoster...

Educate your staff or have them trained properly to mitigate security issues and do not put the end-user at risk: hxtp://suspendeddomain.org/b/
Detected libraries:
jquery - 1.4 : -http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
1 vulnerable library detected

Scanner output:
Scanning -http://suspendeddomain.org/b/
Script loaded: -http://www.statcounter.com/counter/counter.js
Script loaded: -http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js
Status: success

And again CloudFlare mentioned here: http://toolbar.netcraft.com/site_report?url=http://suspendeddomain.org
Warnings on that code: https://html5.validator.nu/?doc=http%3A%2F%2Fsuspendeddomain.org%2Fd%2F

B-Status Comodo Certified:
https://www.ssllabs.com/ssltest/analyze.html?d=ifastnet.com
DANG vulnerable: https://shaaaaaaaaaaaaa.com/check/22413427185.ifastnet.org
-22413427185.ifastnet.org is still using SHA-1. A shame really, should have been left Jan this year!

polonus (volunteer website security analyst and website error-hunter)