See the iFrame:
What webpage after a hack encountered this fate: http://killmalware.com/eatonhealthy.com/#
Let’s see how it now earns for mcc dot godaddy dot com “from the grave”, and also in an insecure way:
-http://eatonhealthy.com/
Detected libraries:
jquery - 1.3.1 : (active1) -http://ak2.imgaft.com/script/jquery-1.3.1.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
1 vulnerable library detected
Scanner output:
Scanning -http://eatonhealthy.com/ …
Status: success
Script loaded: -http://www.google.com/adsense/domains/caf.js (starts downloading right away)
Script loaded: -http://ak2.imgaft.com/script/jquery-1.3.1.min.js *
Detected library: jquery - 1.3.1
Load time: 2485ms
- containing viruses and malcode, blocked by Bitdefender TrafficLight
Let us scan the park address: http://mcc.godaddy.com/park/pz5aLzS1pz55M3IfYaOvrt==
Detected libraries:
jquery - 1.3.1 : (active1) -http://ak2.imgaft.com/script/jquery-1.3.1.min.js *
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
(active) - the library was also found to be active by running code
1 vulnerable library detected
Scanner output:
Scanning -http://mcc.godaddy.com/park/pz5aLzS1pz55M3IfYaOvrt== …
Status: success
Script loaded: -http://www.google.com/adsense/domains/caf.js
Script loaded: -http://ak2.imgaft.com/script/jquery-1.3.1.min.js
Detected library: jquery - 1.3.1
Load time: 1718ms
Shun GoDaddy parked websites, my friends, they’re may be full of crap, when the original owners did not reclaim them.
polonus