See: http://killmalware.com/howvisible.com/#
Detected libraries:
jquery - 1.6.2 : (active1) -http://howvisible.com/js/jquery-1.6.2.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery-ui-dialog - 1.8.16 : (active1) -http://howvisible.com/js/jquery-ui-1.8.16.custom.min.js
Info: Severity: medium
http://bugs.jqueryui.com/ticket/6016
jquery-ui-autocomplete - 1.8.16 : -http://howvisible.com/js/jquery-ui-1.8.16.custom.min.js
(active) - the library was also found to be active by running code
2 vulnerable libraries detected
info: [iframe] 127.0.0.1/javascript:false;
info: [decodingLevel=0] found JavaScript
error: line:3: SyntaxError: missing ) after condition:
error: line:3: s.containment[1]+g.top,this.containment[2]+g.left,this.containment[3]+g.top]}else g=this.containment;if(a.pageX-this.offset.click.left<g[0])e=g[0]+this.offset.click.left; if(a.pageY-this.offset.click.top<g[1])h=g[1]+this.offset.click.top;if(a.pageX-thi
error: line:3: ............................................................................
Header returned by request for: hxtp://howvisible.com -> 50.63.217.1Redleg’s File Viewer scan quote…HTTP/1.1 302 Moved Temporarily
Date: Wed, 18 May 2016 19:58:10 GMT
Server: Apache
Location: htxp://fpert.qpoe.com/
Note: This line has redirected the request to htxp://fpert.qpoe.com/
Content-Length: 0
Connection: close
Content-Type: text/html
Re: dangerous site to spread malware: http://labs.sucuri.net/?details=fpert.qpoe.com
and read: https://community.norton.com/forums/help-httpfpertqpoecom
polonus (volunteer website security analyst and website error-hunter)