See 2 to flag: https://www.virustotal.com/gui/url/ef29ad7612e6a7d1c2953adb033a0e255ad06b4bcb9bba976adfef5de70a6d7c?nocache=1
and what is being flagged by Quttera’s: https://quttera.com/detailed_report/www.proxysite.com
/js/65f94d5.js?v=17030501
Severity: Potentially Suspicious
Threat: PS.HiddenJS.gen
Reason: Procedure: + has been called with a string containing hidden JavaScript code CscriptEwindow.onload = function(){var em = parent.jQuery("#")[0];window.onresize = function(){if(parent.jQuery.onFontResize){parent.jQuery.onFontResize.trigger(em.offsetWidth / 100);}}};C/scriptE.
Details: Suspicious JavaScript code injection. Etc.
Also consider: https://urlscan.io/result/d2d73e0f-df0b-40f6-9c47-8c91da2a5a31/
and https://urlscan.io/result/2a710762-c566-420c-b46f-71e5e13e758a/
polonus
Errors found with retire js on -privacy.com the company behind -proxysite dot com:
Retire.js
bootstrap 3.3.7 Found in -https://pryvacy.com/js/bootstrap.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331 1
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041 1
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040 1
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042 1
Medium XSS is possible in the data-target attribute. CVE-2016-10735 1
jquery 2.2.4 Found in -https://pryvacy.com/js/jquery.js _____Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Also: https://urlscan.io/result/6480776e-d372-412e-b26c-8a43a9c6195d/
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)