See: unknown_html ARIN US abuse at -thewebhostserver.com 192.65.243.11 to 192.65.243.11
Re: https://www.virustotal.com/en-gb/url/4ddf3b620a33a0acfd70ba39d03e75135fcb05b5318e5a72451093f0cdbcf031/analysis/1469983702/
Bitdefender TrafficLight flags. Nothing here: https://urlquery.net/report.php?id=1469981289614
The code that was flagged: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fceregypt.com%2Fscreenimg.php%3Fiid%3D350
The scripts flagged: -http://ceregypt.com
Detected libraries:
swfobject - 2.0 : -http://ceregypt.com/Scripts/swfobject_modified.js
Info: Severity: medium
https://code.google.com/p/swfobject/wiki/release_notes
https://code.google.com/p/swfobject/source/detail?r=181
swfobject - 2.0 : -http://ceregypt.com/Scripts/swfobject_modified.js
Info: Severity: medium
https://code.google.com/p/swfobject/wiki/release_notes
https://code.google.com/p/swfobject/source/detail?r=181
2 vulnerable libraries detected
This seems OK: https://sritest.io/#report/47abb9b5-ceed-4f94-acbc-845a4d47dbb2
See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fceregypt.com%2FScripts%2Fswfobject_modified.js
We see cross browser code so validated the HTML standard: https://validator.w3.org/check?uri=http%3A%2F%2Fceregypt.com&charset=(detect+automatically)&doctype=Inline&group=0
Avoid ac.innerHTML = obj.innerHTML; avoid directly inserting into the document.
What specific error in that code detected:
found JavaScript
error: line:4: SyntaxError: missing } after try block:
error: line:4: ContentId, true); if (ua.ie && ua.win) { storedAltContent.style.display = "block"; } } storedAltContent = null; storedAltContentId = null; isExpressInstallActive = false; } } } }; }();
error: line:4: ...^
Version not specified? Unreachable code?
polonus (volunteer website security analyst and website error-hunter)