See: http://killmalware.com/qs300.cn/#
Fail and three warnings: http://killmalware.com/qs300.cn/#
jQuery vuln.: http://www.qs300.cn/
Detected libraries:
jquery - 1.8.3 : (active1) -http://www.qs300.cn/js/jquery-1.8.3.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
1 vulnerable library detected
3 blacklistings: https://mxtoolbox.com/domain/www.qs300.cn/
See: -https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Fwww.qs300.cn%2F&ref_sel=GSP2&ua_sel=ff&fs=1
F-F-X-status: https://observatory.mozilla.org/analyze.html?host=www.qs300.cn
No alerts here: http://urlquery.net/report.php?id=1481324579773
polonus (volunteer website security analyst and website error-hunter)