Scripts/swfobject_modified.js vulnerable!

See: https://www.virustotal.com/nl/url/500fe5d7544f1ec2653d86d8e53501a3c439f6cae3b95b5def18f36a98e36d78/analysis/1430750343/
See: https://sitecheck.sucuri.net/results/www.blackmountainapparel.com

An oldie from 2011: https://forum.avast.com/index.php?topic=89979.0
See: http://xss.cx/2011/12/07/ghdb/sql-injection-reflected-xss-zip-parameter-mysql-5045-standardlog-example-poc-report-theinsidercom.htm

pol

Update - reappearing issue here: http://killmalware.com/dominicanrepublictoptravel.com/
SE visitors redirects
jQuery to be retired: -http://dominicanrepublictoptravel.com/
Detected libraries:
swfobject - 2.0 : -http://www.toptravelgroup.com/Scripts/swfobject_modified.js
Info: Severity: medium
https://code.google.com/p/swfobject/wiki/release_notes
https://code.google.com/p/swfobject/source/detail?r=181
1 vulnerable library detected

Insecure IDs tracking: 66% of the trackers on this site could be protecting you from NSA snooping. Tell toptravelgroup.com to fix it.

All trackers
At least 3 third parties know you are on this webpage.

-Adobe
-shaaaaaaaaaaaaa.com
-www.toptravelgroup.com -www.toptravelgroup.com

polonus