Suspicious block of script on website flagged?

See line 1017 in the source code: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=globalnetlive.com%2Fcart.php%3Fqty%3D1%26id_pr&ref_sel=GSP2&ua_sel=ff&fs=1
672 bytes attached as harmless txt file =known javascript malware. Details: http://sucuri.net/malware/entry/mw:js:gen2?web.js.injection.tag1_php.001

32 instances detected of threat Name: JS.Redirector and direct links to location.
Flagged also at: https://yandex.com/infected?l10n=en&url=globalnetlive.com
And at https://zulu.zscaler.com/report/d874359d-2155-4aae-ab31-c88f3580a401

Re: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fglobalnetlive.com%2Forder.php%3F

2 retirable jQuery libraries: http://retire.insecurity.today/#!/scan/d8d5a4b1c349de0c0fe409ddf195322b1977a5d9ca2323efb6ca9cd86bdaf895

error detected:

found JavaScript
error: line:3: SyntaxError: invalid flag after regular expression:
error: line:3: }).filter(function(){return this.name&&!this.disabled&&(this.checked||/select|textarea/i.test(this.nodeName)||/text|hidden|password/i.test(this.type))}).map(function(i,c){var b=D(this).val();return b==null?null:b.constructor==Array?D.map(b,function(a,i){r
error: line:3: ^
iTag Span error (pol).

See: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fglobalnetlive.com%2Forder.php%3F&useragent=Fetch+useragent&accept_encoding=

polonus (volunteer website security analyst and website error-hunter)

HTML scan :wink:
https://www.virustotal.com/#/file/f185c3492660e1b228a32e414cb738b4d52b2e01e311ef6707b7289e89ebcd5d/detection

Sucuri >> https://sitecheck.sucuri.net/results/globalnetlive.com

Thanks, Pondus, for your apt detection confirmation.
We are being protected,

polonus