Website vulnerable to XSS VULNERABILITY IN APACHE MOD_PAGESPEED MODULE

See: http://fetch.scritch.org/%2Bfetch/?url=www.yellowmoxie.com&useragent=Fetch+useragent&accept_encoding=
http://urlfind.org/?site=yellowmoxie.com#

Site has a “cut & paste user” link-tracker code with this script:

 var addthis_config={"data_track_addressbar":true}; 

XSS vuln. http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.yellowmoxie.com
See: Results from scanning URL: htxp://staticym02.rtbcdn.com/js/fns.js
Number of sources found: 53
Number of sinks found: 40

On site: taticym02.rtbcdn dot com/images/banner_ads.swf → http://www.woorank.com/en/www/yellowmoxie.com
http://www.whoisip.co.za/source/yellowmoxie.com

XSS vuln: Results from scanning URL: htxp://staticym02.rtbcdn.com/js/jquery.ui.widget.js
Number of sources found: 117
Number of sinks found: 91

Consider: http://shitcha.com/yellowmoxie.com

Unwanted link ad-yieldmanager-com from website code means a risk. Read: http://www.2-removevirus.com/nl/ad-yieldmanager-com-verwijderen/

polonus