See line 1017 in the source code: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=globalnetlive.com%2Fcart.php%3Fqty%3D1%26id_pr&ref_sel=GSP2&ua_sel=ff&fs=1
672 bytes attached as harmless txt file =known javascript malware. Details: http://sucuri.net/malware/entry/mw:js:gen2?web.js.injection.tag1_php.001
32 instances detected of threat Name: JS.Redirector and direct links to location.
Flagged also at: https://yandex.com/infected?l10n=en&url=globalnetlive.com
And at https://zulu.zscaler.com/report/d874359d-2155-4aae-ab31-c88f3580a401
Re: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fglobalnetlive.com%2Forder.php%3F
2 retirable jQuery libraries: http://retire.insecurity.today/#!/scan/d8d5a4b1c349de0c0fe409ddf195322b1977a5d9ca2323efb6ca9cd86bdaf895
error detected:
found JavaScriptiTag Span error (pol).
error: line:3: SyntaxError: invalid flag after regular expression:
error: line:3: }).filter(function(){return this.name&&!this.disabled&&(this.checked||/select|textarea/i.test(this.nodeName)||/text|hidden|password/i.test(this.type))}).map(function(i,c){var b=D(this).val();return b==null?null:b.constructor==Array?D.map(b,function(a,i){r
error: line:3: ^
polonus (volunteer website security analyst and website error-hunter)