Why do we see this here then?
-nfo: [decodingLevel=0] found JavaScript
error: undefined function window.addEvent *
error: undefined variable set
error: undefined variable set[1]
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var set[1] = 1;
error: line:1: …^
This typical when viewed in a firefox browser as window.event doesn’t exist in there (IE).
Chrome doesn’t have it natively either. * Info credits thanks to
Joseph the Dreamer and Tim Down on StackOverflow.
Redirecting script standard setup tracking Google Analytics. Benign.
Here we see an error because an include was forgotten
undefined function Lightbox.init.bind
error: undefined variable Lightbox
error: undefined variable Lightbox.init
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var Lightbox.init = 1; *
error: line:1: …^
Also when we have potential suspicious file flags from Quttera’s this then only means that some insecure script practice was/is being used.
It does not mean the code is being abused or is really malicious by nature.
But a clever attacker just like with excessive header info and outdated website software might abuse known exploits,
they may come to exploit these bad coding practices. So in the ideal world website coders should always develop with security in mind.
Alas we might have a lot of educating to do here on the forums, but we will keep trying to improve the present situation,
which leaves a lot to be wished for.